US20170099188A1 - Policy-driven switch overlay bypass in a hybrid cloud network environment - Google Patents
Policy-driven switch overlay bypass in a hybrid cloud network environment Download PDFInfo
- Publication number
- US20170099188A1 US20170099188A1 US14/876,627 US201514876627A US2017099188A1 US 20170099188 A1 US20170099188 A1 US 20170099188A1 US 201514876627 A US201514876627 A US 201514876627A US 2017099188 A1 US2017099188 A1 US 2017099188A1
- Authority
- US
- United States
- Prior art keywords
- virtual machine
- virtual
- tunnel
- direct tunnel
- switch
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0896—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
- H04L41/122—Discovery or management of network topologies of virtualised topologies, e.g. software-defined networks [SDN] or network function virtualisation [NFV]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/103—Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
Definitions
- the subject matter of this disclosure relates in general to the field of computer networks, and more specifically for establishing policies to bypass a virtual switch overlay in a hybrid cloud network environment.
- hybrid cloud architectures Industry trends indicate a growing movement among enterprises and other entities towards hybrid cloud architectures. These enterprises and other entities may be choosing such systems so that they can acquire additional on-demand computing, storage, and network resources, and eliminating the need to build for peak capacity within their own data centers.
- a potential advantage of leveraging public clouds is that they may not have the same initial capital investments that may be necessary to build out a company's own private data center.
- Another potential benefit for public cloud is that they may better absorb a company's need for elasticity by providing almost unlimited pay-as-you-grow expansion.
- hybrid cloud designs can be conceptually and financially attractive, enterprises may be reluctant to place mission-critical applications in the public cloud because of a perception that migrating workloads from an on-premises network to a public network may significantly reduce control, security, and efficiency of enterprise applications.
- FIG. 1 illustrates an example hybrid cloud network environment that can be utilized in an example embodiment
- FIGS. 2A and 2B illustrate example approaches for distributing network traffic in a hybrid cloud environment that can be utilized in some example embodiments
- FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that of FIG. 2B ;
- FIG. 4 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in an example embodiment
- FIG. 5 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in another example embodiment
- FIG. 6 an example hybrid cloud network environment that can be utilized in another example embodiment.
- FIGS. 7A and 7B illustrate example systems that can be used in various example embodiments.
- Network policies can be used to optimize the flow of network traffic between virtual machines (VMs) in a hybrid cloud environment.
- one or more policies can drive a virtual switch controller, a hybrid cloud manager, a hypervisor manager, a virtual switch, or other orchestrator to create one or more direct tunnels that can be utilized by a respective pair of VMs to bypass the virtual switch and enable direct communication between the VMs.
- the virtual switch can send the VMs network and security policies to ensure that these policies are enforced.
- the VMs can exchange security credentials in order to establish the direct tunnel.
- the direct tunnel can be used by the VMs to bypass the virtual switch and allow the VMs to communicate with each other directly.
- a computer network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between endpoints, such as personal computers and workstations.
- endpoints such as personal computers and workstations.
- Many types of networks are available, with the types ranging from Local Area Networks (LANs) and Wide Area Networks (WANs) to overlay networks and Software-Defined Networks (SDNs).
- LANs Local Area Networks
- WANs Wide Area Networks
- SDNs Software-Defined Networks
- LANs typically connect nodes over dedicated private communications links located in the same general physical location, such as a building or campus.
- WANs typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), or synchronous digital hierarchy (SDH) links.
- LANs and WANs can include layer 2 (L2) and/or layer 3 (L3) networks and devices.
- the Internet is an example of a WAN that connects disparate networks throughout the world, providing global communication between nodes on various networks.
- the nodes typically communicate over the network by exchanging discrete frames or packets of data according to predefined protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP).
- TCP/IP Transmission Control Protocol/Internet Protocol
- a protocol can refer to a set of rules defining how the nodes interact with each other.
- Computer networks may be further interconnected by an intermediate network node, such as a router, to extend the effective size of each network.
- Overlay networks generally allow virtual networks to be created and layered over a physical network infrastructure.
- Overlay network protocols such as Virtual Extensible LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), Network Virtualization Overlays (NVO3), and Stateless Transport Tunneling (STT), can provide a traffic encapsulation scheme to allow network traffic to be carried across L2 and L3 networks over a logical tunnel.
- VXLAN Virtual Extensible LAN
- NVGRE Network Virtualization using Generic Routing Encapsulation
- NVO3 Network Virtualization Overlays
- STT Stateless Transport Tunneling
- Overlay networks can also include virtual segments, such as VXLAN segments in a VXLAN overlay network, which can include virtual L2 and/or L3 overlay networks over which virtual machines (VMs) communicate.
- the virtual segments can be identified through a virtual network identifier (VNI), such as a VXLAN network identifier, which can specifically identify an associated virtual segment or domain.
- VNI virtual network identifier
- Network virtualization allows hardware and software resources to be combined in a virtual network.
- network virtualization can allow multiple numbers of VMs to be attached to the physical network via respective virtual LANs (VLANs).
- VLANs virtual LANs
- the VMs can be grouped according to their respective VLAN, and can communicate with other VMs as well as other devices on the internal or external network.
- Cloud computing can also be provided in a network to provide computing services using shared resources.
- Cloud computing can generally include Internet-based computing in which computing resources are dynamically provisioned and allocated to client or user computers or other devices on-demand, from a collection of resources available via the network (e.g., “the cloud”).
- Cloud computing resources can include any type of resource, such as computing, storage, and networking, among others.
- resources may include service devices (firewalls, deep packet inspectors, traffic monitors, load balancers, etc.), compute/processing devices (servers, CPUs, GPUs, random access memory, caches, etc.), and storage devices (e.g., network attached storages, storage area network devices, hard disk drives, solid-state devices, etc.), among others.
- such resources may be used to support virtual networks, VMs, databases, applications (“apps”), etc.
- Cloud computing resources may include a “private cloud,” a “public cloud,” and/or a “hybrid cloud.”
- a “private cloud” can be a cloud infrastructure operated by an enterprise for use by the enterprise, while a “public cloud” can be a cloud infrastructure that provides services and resources over a network for public use.
- a “hybrid cloud” can be a cloud infrastructure composed of two or more clouds that inter-operate or federate through cloud orchestration, cloud management, cloud automation, or similar technologies.
- a hybrid cloud can be thought of as an interaction between private and public clouds where a private cloud joins a public cloud and utilizes public cloud resources in a secure and scalable manner.
- FIG. 1 illustrates an example hybrid cloud network environment 100 that can be utilized in an example embodiment.
- Hybrid cloud network environment 100 can include a plurality of networks or clouds, such as a private cloud 102 (e.g., an enterprise virtual datacenter) and a public cloud 104 separated by a WAN 106 , such as the Internet.
- a hybrid cloud is sometimes defined as consisting of a private cloud and a public cloud, it should be understood that many aspects of this disclosure can be practiced in various configurations (e.g., two or more public clouds hosted by third party cloud providers and/or two or more private clouds of an enterprise located in different locations).
- the private cloud 102 and the public cloud 104 can be integrated using overlay network techniques, such as VXLAN, NVGRE, NVO3, STT, or other overlay network protocols known to those of ordinary skill.
- the private cloud 102 and public cloud 104 can be connected via a site-to-site tunnel or communication link 108 between a private cloud network gateway 110 and a public cloud network gateway 112 .
- the private cloud network gateway 110 can be configured as a VM for extending the private cloud across the Internet to the public cloud 104 through the site-to-site tunnel 108 .
- the public cloud network gateway 112 can be configured as a VM switch overlay for interconnecting workloads running in the public cloud 104 via secure access tunnels, and for forwarding network traffic to the private network 102 using the site-to-site tunnel 108 .
- the private cloud network gateway 110 can be implemented using Intercloud FabricTM Extender (ICX) from Cisco®, Systems, Inc. of San Jose, Calif.
- the public cloud network gateway 112 can be implemented using Intercloud FabricTM Switch (ICS) from Cisco®, and the ICX/ICS pair can form an Intercloud FabricTM Cloud (ICFCloud).
- ICX Intercloud FabricTM Extender
- ICS Intercloud FabricTM Switch
- the private cloud network gateway 110 can establish, from the private cloud 102 , the secure site-to-site tunnel 108 to interconnect with the public cloud network gateway 112 , and interact with a virtual switch controller or Virtual Supervisor Module (VSM) 114 .
- VSM Virtual Supervisor Module
- the VSM 114 can serve as a network controller for managing the network and security policies of the overlay network.
- the VSM 114 can be implemented in an active-standby model to ensure high availability, with a first VSM functioning in a primary role and a second VSM functioning in a secondary role. If the first VSM fails, the second VSM can take over control.
- a virtual chassis model can be used to represent VSM 114 and each virtual switch or Virtual Ethernet Module (VEM) under the VSM's control or within the VSM's domain, such as VEM 116 a in the private cloud and public cloud VEM 116 b .
- VEM Virtual Ethernet Module
- the high availability pair of VSMs 114 can be associated with slot numbers 1 and 2 in the virtual chassis, and the VEMs 116 a and 116 b can be sequentially assigned to the remaining slots.
- VSM 114 may be configured to provide control plane functionality for the virtual switches or VEMs 116 a and 116 b .
- the VEMs 116 a and 116 b can provide network connectivity and switching capability for VMs hosted on a corresponding server like a line card in a modular switching platform, and can operate as part of a data plane associated with the control plane of VSM 114 . Unlike multiple line cards in a single chassis, each VEM can act as an independent switch from a forwarding perspective. In some example embodiments, the VEMs 116 a and 116 b may form a distributed virtual switch that can be controlled by the VSM 114 . In an example embodiment, the VSM 114 and VEMs 116 a and 116 b can be implemented using Cisco Nexus® 1000V Series Switches.
- the private cloud 102 can also include a hybrid cloud manager 120 , which can be a management plane VM for auto-provisioning resources within the hybrid cloud network environment 100 .
- the hybrid cloud manager 120 can be a management platform running in the private cloud 102 , and may be responsible for providing hybrid cloud operations, translating between private cloud and public cloud interfaces, managing cloud resources, instantiating cloud gateways and cloud VMs though a private virtualization platform or hypervisor manager 122 and public cloud provider application programming interfaces (APIs).
- APIs application programming interfaces
- the hybrid cloud manager 120 may also monitor the health of all of the components of the network (e.g., cloud gateways, VMs, and communication links) and ensure high availability of those components.
- the hybrid cloud manager 120 can be implemented as a virtual appliance, such as the Intercloud FabricTM Director (ICFD) from Cisco®.
- ICFD Intercloud FabricTM Director
- the ICFD can be a hybrid cloud orchestration component that can provide a single point of management and consumption of hybrid cloud resources. That is, the ICFD can offer a single console so that users can provision workloads and associated policies.
- the ICFD can also expose northbound APIs, which allow users to programmatically manage their workloads in the hybrid cloud environment 100 or integrate with other cloud management platforms.
- the private cloud 102 can include one or more physical servers 124 that each deploy a hypervisor 126 (also sometimes referred to as a virtual machine manager or a virtual machine monitor (VMM)).
- the hypervisor 126 may be computer software, firmware, or hardware that creates and runs one or more VMs, such as VMs 128 or cVMs 118 .
- VMs may or may not be managed by a hypervisor.
- the hypervisor 126 can provide a respective operating system to one or more VMs.
- the hypervisor 126 may be a native or “bare metal” hypervisor that runs directly on hardware, but that may alternatively run under host software executing on hardware.
- the hypervisor 126 can be managed by the virtualization platform or hypervisor manager 122 , such as vSphere® from VMware®, Inc. of Palo Alto, Calif., Hyper-V® from Microsoft® Corp. of Seattle, Wash., XenServer® from Citrix® Systems, Inc. of Santa Clara, Calif., or Red Hat® Enterprise Virtualization from Red Hat®, Inc. of Raleigh, N.C.
- Each VM can host a private application.
- each public cloud VM 118 may be connected to the public cloud network gateway 112 via secure access tunnels, as discussed elsewhere herein.
- one or more cVMs 118 can be configured to operate as a public cloud firewall (not shown), such as an Intercloud FabricTM Firewall or Virtual Security Gateway (VSG) from Cisco®.
- one or more cVMs 118 can be configured to operate as a public cloud router (not shown), such as an Intercloud FabricTM Router or Cloud Services Router (CSR) from Cisco®.
- CSR Cloud Services Router
- the public cloud network gateway 112 can establish, from the public cloud 104 , the secure site-to-site tunnel 108 to interconnect with the private cloud network gateway 110 , secure access tunnels to connect public cloud VMs (cVMs) 118 , and monitor and report statistics for the public cloud VMs and any component failures in the public cloud 104 .
- the private cloud network gateway 110 and the public cloud network gateway 112 can be deployed as a high-availability pair to provide redundancy.
- the public cloud network gateway 112 can include a cloud virtual switch or cloud Virtual Ethernet Module (cVEM) 116 b that communicates with the VSM 114 to retrieve VM-specific network policies (e.g., port profiles), switches network traffic between public cloud VMs 118 , switches network traffic between public cloud VMs and the private cloud 102 , applies network policies, and monitors and reports VEM-related statistics.
- cVEM cloud virtual switch or cloud Virtual Ethernet Module
- each physical server such as physical server 124 , hosting a VM, including VM 128 and cVM 118 , can include multiple Virtual Network Interface Cards (VNICs) (not shown) for providing specific functionality, such as control and/or data/packet transmission.
- VNICs Virtual Network Interface Cards
- a VM on a physical server can include a vNIC that may be connected to a VEM, such as VEM 116 a or cVEM 116 b , for connecting the VM or cVM to the network.
- Each physical server 124 can include a vNIC for enabling control functionality, such as Small Computer Systems Interface over IP (iSCSI), Network File System (NFS) access, migration of VMs or cVMs, directly connected tunnels, discussed elsewhere herein, as well as other control functionality.
- control functionality such as Small Computer Systems Interface over IP (iSCSI), Network File System (NFS) access, migration of VMs or cVMs, directly connected tunnels, discussed elsewhere herein, as well as other control functionality.
- each public cloud VM 118 can include an agent (not shown) that provides for the network overlay logic for the public cloud VM.
- the agent can be deployed in the cVM as a secure tunnel driver.
- the agent can establish a secure access tunnel to connect the public cloud VM 118 to the public cloud network gateway 112 , and monitor and report secure overlay-related statistics.
- the agent can be implemented using Intercloud FabricTM Agent (ICA) from Cisco®.
- ICA Intercloud FabricTM Agent
- the secure site-to-site tunnel or communication link 108 can take one of several forms, such as various types of virtual private networks (VPNs) or Layer 2 (L2) tunneling protocols.
- VPNs virtual private networks
- L2 Layer 2
- some example embodiments may utilize an open VPN (e.g., OpenVPN) overlay or an IP Security (IPSec) VPN based L3 network extension to provide the communication link 108 .
- Some example embodiments may utilize a secure transport layer (i.e., L4) tunnel as the communication link 108 between the private cloud network gateway 110 and the public cloud network gateway 112 , where the secure transport layer tunnel 108 can be configured to provide a link layer (i.e., L2) network extension between the private cloud 102 and the public cloud 104 .
- L4 secure transport layer
- Some example embodiments may establish the secure transport layer (i.e., L4) tunnel 108 (e.g., Transport Layer Security (TLS), Datagram TLS (DTLS), Secure Socket Layer (SSL), etc.) over the public network 104 , and can build a secure L2 switch overlay that interconnects public cloud resources with private clouds (e.g., enterprise network backbones).
- L4 tunnel 108 can provide a link layer network extension between the private cloud 102 and the public cloud 104 .
- the private cloud network gateway 110 can use an L4 secure tunnel as the communication link 108 to connect to the cloud resources allocated in the public cloud 104 .
- the L4 secure tunnel may be well-suited for use with corporate firewalls and Network Address Translation (NAT) devices due to the nature of the transport level protocols (e.g., UDP/TCP) and the transport layer ports opened for HTTP/HTTPS in the firewall.
- NAT Network Address Translation
- the L2 network can thus be further extended and connected to each of the cloud VMs 118 through the public cloud network gateway 112 .
- instances of a particular private application VM can be seamlessly migrated to the overlay network dynamically created in the public cloud 104 , without substantial impact to existing corporate infrastructure.
- FIGS. 2A and 2B illustrate example approaches for distributing VM-to-VM network traffic in a public cloud 204 of a hybrid cloud network that can be utilized in some example embodiments.
- the public cloud environment 204 can include a public cloud network gateway 212 and public cloud VMs 218 a , 218 b , 218 c , and 218 d .
- a cloud manager e.g., cloud manager 120 of FIG. 1
- the cloud manager can interface with a hypervisor manager (e.g., hypervisor manager 122 of FIG. 1 ) (not shown) to instantiate a VM (e.g., VM 128 of FIG. 1 ) (not shown) in the private cloud and configure the VM to operate as a private cloud network gateway (e.g., private cloud network gateway 110 of FIG. 1 ) (not shown).
- the cloud manager can also interface with a hypervisor manager in the public cloud 204 or cloud provider APIs to instantiate a plurality of public cloud VMs (e.g., cVMs 218 a , 218 b , 218 c , or 218 d ).
- One or more of the cVMs can be configured to operate as the public cloud network gateway 212 .
- One or more of the cVMs can be configured to operate as a public cloud firewall (not shown).
- One or more of the cVMs can be configured to operate as a public cloud router (not shown).
- One or more of the cVMs can be configured for migrating workloads from the private cloud to the public cloud 204 .
- the cloud manager can also establish a site-to-site tunnel or secure network extension 208 between the private cloud network gateway and the public cloud network gateway 212 .
- a public cloud VM agent 230 can be utilized to provide a compute environment and network overlay for the public cloud VMs 218 a , 218 b , 218 c , and 218 d .
- the cVMA 230 can be deployed in a public cloud VM as a secure tunnel driver that runs within the public cloud VM's operating system.
- the agent 230 can cause a cVM to direct network traffic to the secure overlay network by establishing a secure tunnel (e.g., access tunnels 232 a and 232 b ) to connect to the public cloud network gateway 212 for allowing the cVMs to communicate with private cloud VMs and other public cloud VMs.
- the cVMA 230 can also collect secure overlay-related statistics.
- the access tunnel 232 a can be used for secure communications between cVM 218 a and 218 d
- the access tunnel 232 b can be used for secure communications between public cloud VM 218 b and public cloud VM 218 c
- the public cloud VM 218 a desires to send a packet to the public cloud VM 218 d
- the packet can first be sent to the public cloud network gateway 212 , where network and security policy may be enforced.
- the public cloud network gateway 212 may forward the packet to the cVM 218 d . That is, packets sent between cVMs 218 a and cVM 218 d may pass through the public cloud network gateway 212 before arriving at the packets' intended destinations.
- FIG. 2B illustrates an example approach.
- a direct connection or Directly Connected Tunnel (DCT) 234 a may be established between cVM 218 a and cVM 218 d
- a direction connection or DCT 234 b may be established between cVM 218 b and 218 c .
- DCT Directly Connected Tunnel
- Network traffic between cVMs 218 a and 218 d can bypass the public cloud network gateway 212 by transmitting the traffic through the directly connected tunnel 234 a .
- communications between cVMs 218 b and 218 c can bypass the public cloud network gateway 212 by sending the communications over the directly connected tunnel 234 b.
- a direct connection or DCT can refer to a direct connection from an overlay network perspective rather than a direct physical connection.
- cVMs 218 a and 218 d may not be directly connected to a same Ethernet (L2) hub, but can achieve L2 adjacency via VXLAN, NVGRE, NVO3, STT, or other suitable overlay network protocol.
- access tunnel 232 a may be referred to as an indirect tunnel because traffic between cVMs 218 a and 218 d includes a hop over the public cloud network gateway 212 .
- DCT 234 a can be referred to as a direct tunnel because it does not include such hop.
- DCTs can reduce bandwidth requirements of the public cloud network gateway 212 and minimize the chances of the public cloud network gateway becoming a bottleneck for the hybrid cloud network, bypassing the public cloud network gateway may also result in network and security policy becoming unenforced.
- FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that of FIG. 2B .
- the public cloud environment 304 can include a public cloud network gateway 312 interconnected with public cloud VMs 318 a and 318 b .
- the cVM 318 a can be assigned IP address 10 . 10 . 10 . 10 and MAC address aa.aa.aa
- the cVM 318 b can be assigned IP address 20 . 20 . 20 . 20 and MAC address bb.bb.bb.
- the cVMs 318 a and 318 b may be indirectly connected via a secure access tunnel 332 .
- traffic between these cVMs transmitted along the access tunnel at one endpoint of the access tunnel can include a hop over the public cloud network gateway 312 before arriving at the other end of the access tunnel.
- the secure access tunnel 332 can be associated with tunnel identifier 1 .
- the cVMs 318 a and 318 b may also be directly connected via a direct connection or DCT 334 .
- the DCT 334 can be associated with tunnel identifier 2 .
- the cVMs 318 a and 318 b can communicate with each other through the secure access tunnel 332 (and through the public cloud network gateway 312 ).
- the public cloud network gateway 312 can establish the access tunnel 332 as a default access tunnel during the initial deployment of a cVM and have network traffic between cVMs pass through the public cloud network gateway as a default forwarding policy.
- cVM 318 a 's egress forwarding table 336 can be initialized to include an entry of “*” or all addresses for the destination IP address, “*” or all addresses for the destination MAC address, and a tunnel identifier of 1 to indicate that cVM 318 's egress traffic should be forwarded on the default access tunnel 1 , i.e., forwarded to the public cloud network gateway 312 .
- the cVM 318 b can have a similar egress forwarding table including a similar default forwarding policy. In the example embodiment of FIG.
- the cVM 318 b may have a default security policy or Access Control List (ACL) that denies all incoming traffic, which can be represented in the cVM 318 b 's ingress security policy table 338 as an entry including “*” or all addresses for the source address, “*” or all tunnels for the tunnel identifier, and a “Deny” rule for dropping incoming traffic corresponding to the source address and source tunnel.
- ACL Access Control List
- the cVM 318 a may include a similar ingress security policy table with a default security policy or ACL.
- policies can be defined for connecting a first cVM to a second cVM via a DCT.
- a DCT policy can be on-demand or enforced when any cVM mutually connected to a same public cloud network gateway attempt to communicate with one another.
- the public cloud network gateway can be configured to orchestrate the creation of a DCT tunnel between a pair of cVMs based on an initial attempted cVM-to-cVM communication via a secure access tunnel, such as an Address Resolution Protocol (ARP) request.
- ARP Address Resolution Protocol
- a DCT policy can be application-driven or enforced by a cloud orchestration component (e.g., the VSM 114 of FIG.
- the management interface can be utilized to configure a public cloud network gateway to set up one or more DCTs among a set of cVMs connected to the gateway based on the application network profiles or requirements.
- a DCT policy can be statistics-driven or enforced according to metrics relating to the hybrid cloud network.
- a cVM agent and/or public cloud network gateway can monitor latency, bandwidth, throughput, response time, or other suitable processing and/or network performance measurement until such measurement is below a threshold, above a threshold, or otherwise satisfies a threshold condition.
- the public cloud network gateway can establish one or more DCTs to address the threshold condition.
- a public cloud network gateway can be configured to create DCTs on-demand once CPU utilization reaches an upper bound and can revert to a previous network policy when CPU utilization is below a lower bound.
- a cVM agent can monitor and report network latency to a VSM (e.g., the VSM 114 of FIG. 1 ), cloud manager (e.g., cloud manager 120 of FIG. 1 ), hypervisor manager (e.g., hypervisor manager 122 of FIG. 1 ), or other suitable management interface.
- VSM e.g., the VSM 114 of FIG. 1
- cloud manager e.g., cloud manager 120 of FIG. 1
- hypervisor manager e.g., hypervisor manager 122 of FIG. 1
- the management interface can direct the public cloud network gateway to establish one or more DCTs for that cVM to alleviate the network latency.
- other policies can be defined for establishing DCTs as would be known to one of ordinary skill in the art.
- the public cloud network gateway 312 can send network address information and security information (e.g., keys credentials, certificates, or other authentication information) 340 relating to cVM 318 b to the cVM 318 a over the secure access tunnel 332 .
- This can cause the egress forwarding policy table 336 to be updated with an entry, such as “ 20 . 20 . 20 . 20 ” for the destination IP address, “bb.bb.bb” for the destination MAC address, and tunnel identifier 2 , indicating that traffic intended for the cVM 318 b sent by the cVM 318 a should be delivered over direct tunnel 334 .
- the public cloud network gateway 312 can also send security policy information 342 to ensure applicable security policies are enforced.
- the security policy information 342 can cause the ingress security policy table 338 to be populated with an entry comprising “ 10 . 10 . 10 . 10 ” for a source address, tunnel identifier 2 , and an “Allow” rule, which indicates that traffic originating from the source address sent over the DCT 334 can be accepted by the cVM 318 b .
- physical servers hosting cVMs 318 a and 318 b can include control interfaces that can be used to form a control tunnel 344 between cVMs 318 a and 318 b .
- the first cVM's address and security information 340 and the second cVM's security policy information 342 can be sent over the control tunnel 344 . In another example embodiment, such information can be sent over the secure access tunnel 332 .
- FIG. 4 illustrates an example data flow diagram 400 for establishing communications between VMs in a hybrid cloud environment that can be utilized in an example embodiment.
- Data flow diagram 400 may be used for enforcing an on-demand DCT policy, such as when a network is configured to establish a DCT tunnel upon any attempted communication between cVMs connected to the gateway, or the network has defined a statistics-driven DCT policy and a threshold condition corresponding to the policy is satisfied.
- a first VM 418 a and a second VM 418 b are each connected to a virtual switch or public cloud network gateway 412 .
- a secure access tunnel 432 can be established between the cVMs during their deployment.
- the access tunnel 432 can include a hop over the public cloud network gateway 412 .
- the cVM 418 a 's forwarding table (e.g., egress forwarding policy table 336 of FIG. 3 ) can be initialized with a default rule to send egress traffic to the public cloud network gateway 412 over the access tunnel 432 .
- the cVM 418 b 's forwarding table may include a similar entry.
- the respective physical servers hosting cVMs 418 a and 418 b may include respective control interfaces such that a control tunnel 444 can also be created between cVMs 418 a and 418 b.
- the first cVM 418 a can attempt to communicate with the second cVM 418 b , and may begin at 402 by sending an ARP request to the virtual switch or public cloud network gateway 412 to determine network address information for the second cVM.
- the ARP request can be sent over the secure access tunnel 432 based on the first cVM's default forwarding rule.
- the virtual switch or public cloud network gateway 412 can resolve the requested network address information such as by looking up the requested network address in the switch's ARP cache to identify the MAC address of the second cVM 418 b .
- the switch 412 can also retrieve the second cVM's security information, such as keys, credentials, certificates, or other information necessary for establishing a DCT with the second cVM 418 b .
- Keys, credentials, or certificates can include passwords, private keys generated from public-key cryptography methods (e.g., Rivest-Shamir-Adleman (RSA), Digital Signature Algorithm (DSA), Elliptical Curve Digital Signature Algorithm (ECDSA), Diffie-Helman (DH), Elliptic Curve Diffie-Hellman (ECDH)), or secret keys generated from symmetric-key cryptography methods (e.g., International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), Triple-DES, Advanced Encryption Standard (AES), ARCFOUR (RC4), Blowfish, Twofish, Carlisle Adams Stafford Tavares (CAST), etc.
- RSA Rivest-Shamir-Adleman
- DSA Digital Signature Algori
- the switch 412 can send the ARP reply to the first cVM 418 a over the default tunnel 432 .
- the DCT configuration information can be piggybacked onto the ARP reply.
- the virtual switch 412 can also fetch the security policy rules relevant to the second cVM 418 b and may send the security policies to the second cVM's control interface at 406 .
- the first cVM can begin the DCT establishment process or protocol by sending a DCT connection request to the second cVM 418 b over the control tunnel 444 .
- the DCT connection request can include information for authenticating the first cVM 418 a derived from the second cVM's security information, as well as keys, credentials, certificates, or other information necessary to establish a DCT with the first cVM.
- the second cVM 418 b may attempt to authenticate the first cVM using the first cVM's authentication information within the DCT connection request.
- the second cVM 418 b can establish itself as one endpoint of the DCT 434 , such as by updating its ingress security policy table using the received security policies.
- the second cVM 418 b may then send a DCT connection reply that includes information authenticating the second cVM with information derived from the first cVM's security information.
- the second cVM 418 b may also update its egress forwarding table with an entry for forwarding egress traffic to the first cVM 418 a through the DCT 434 .
- the first cVM may attempt to authenticate the second cVM 418 b using the second cVM's authentication information within the DCT connection reply. If the second cVM 418 b is authenticated, the first cVM 418 a may establish itself as the other endpoint of the DCT 434 , such as by updating its egress forwarding policy table with an entry forwarding traffic to the second cVM through the DCT.
- the first cVM 418 a may subsequently send its application traffic directly to the second cVM 418 b via the DCT 434 at 414
- the second cVM 418 b can send its application traffic directly to the first cVM 418 a via the DCT 434 at 416 .
- FIG. 5 illustrates an example data flow diagram 500 for establishing communications between VMs in a hybrid cloud environment that can be utilized in another example embodiment.
- Data flow diagram 500 may be used for enforcing an application-driven DCT policy. For instance, instead of being acted upon according to real-time cVM-to-cVM traffic, such as in the case with an on-demand or statistics-driven DCT policy, an application-driven policy may be based on ANPs or application network requirements. Thus, it may be required to have prior knowledge of the application-level network topology and security requirements of an application before its deployment.
- Another difference between data flow diagrams 400 and 500 may lie in the first few steps of each process. That is 502 and 504 of the data flow diagram 500 may differ from 402 and 404 of the data flow diagram 400 but 506 through 516 of the data flow diagram 500 may be the same or substantially similar to 406 through 416 of the data flow diagram 400 .
- the data flow diagram 500 may begin by defining an ANP based on prior knowledge of the application's network and security requirements.
- the ANP can include configuration of endpoints (e.g., network and security policies) and security information (e.g., keys, credentials, certificates, or other authentication information.
- a cloud orchestration component 546 e.g., the VSM 114 of FIG. 1 , cloud manager 120 of FIG. 1 , hypervisor manager 122 of FIG. 1 , or other management interface
- the ANP can be sent through a secure access tunnel.
- the virtual switch 512 can build one or more DCT tunnels 534 between various VM pairs (e.g., cVMs 518 a and 518 b ) one-by-one until each application node, configured to bypass the virtual switch according to the ANP, is connected to a DCT.
- the virtual switch 512 can send DCT configuration to one or more cVMs over the control tunnel 544 .
- the DCT configuration information can be sent over a secure access tunnel.
- 506 through 516 can be the same or substantially the same as 406 through 416 of FIG. 4 .
- FIG. 6 illustrates an example hybrid cloud network environment 600 that can be utilized in another example embodiment.
- the hybrid cloud network environment 600 can include a private cloud (e.g., private cloud 102 of FIG. 1 ) (not shown) interconnected to a public cloud 604 via a secure network extension or site-to-site tunnel 608 .
- the public cloud 604 can comprise a plurality of hosts, such as a web host 648 , an application host 650 , and a database host 652 . Each host can be implemented as a virtual machine or a bare metal host.
- the web host 648 can include a public cloud network gateway 612 a that interconnects the host to the private cloud by the secure site-to-site tunnel 608 .
- the public cloud network gateway 612 a can also interconnect the web host 648 to the application host 650 by a secure inter-gateway tunnel 654 a.
- the web host 648 can also include web containers 656 a and 656 b .
- the public cloud network gateway 612 a can also be implemented as a container.
- a container is a kind of lightweight virtual machine utilized in operating system level virtualization.
- Operating system level virtualization is a type of server virtualization in which the kernel of an operating system may be capable of providing multiple isolated user space instances or containers. Unlike whole system server virtualization, in which a single server can host multiple operating systems, operating system level virtualization can be used to partition a single operating system among multiple containers. Containers may use less memory and CPU than whole system VMs running similar workloads because only a single kernel may be executed using containers whereas multiple kernels may be executed using whole system VMs. However, containers can raise security concerns not applicable to whole system VMs due to operating system resources being shared.
- the application host 650 can include a public cloud network gateway 612 b and application containers 656 c and 656 d .
- the public cloud network gateway 612 b can be used to interconnect the application host 650 to the web host 648 via the secure inter-gateway tunnel 654 a , and the application host 650 to the database host 652 via the secure inter-gateway tunnel 654 b .
- the database host 652 can include a public cloud network gateway 612 c and database container 656 e . As illustrated in FIG.
- the public cloud 604 can be used to implement a conventional multi-tier or three-tier architecture including a web or presentation tier corresponding to the web host 648 , an application or logic tier corresponding to the application host 650 , and a data or database tier corresponding to the database host 652 .
- one or more application-driven DCT policies can be applied to the public cloud network 604 to create the multi-tier application architecture and the secure inter-gateway tunnels 654 a and 654 b .
- the public cloud network gateways can provide default network connectivity to every container (e.g., via access tunnels) while optimizing network traffic flow by using the DCTs as a primary data path for exchanging application traffic.
- FIG. 7A illustrates an example embodiment of a physical server 724 , such as physical server 124 of FIG. 1 .
- the physical server 724 can include hardware 758 , a hypervisor 726 (e.g., hypervisor 126 of FIG. 1 ), and a public cloud virtual machine 718 (e.g., cVM 118 of FIG. 1 ).
- Hardware 758 can represent any machine or apparatus capable of accepting, performing logic operations on, storing, or displaying data, and may include a processor 760 and memory 762 .
- a cVM agent 730 e.g., cVM agent 230 of FIG. 2
- the cVM agent 730 can include software, such as a network overlay module 764 and a DCT protocol module 766 .
- the network overlay module 764 can be used to provide a compute environment and network overlay for the cVM 718 , and can include logic for establishing a secure tunnel (e.g., access tunnel 332 of FIG. 3 ) to connect the cVM 718 to a public cloud network gateway (not shown).
- the DCT protocol module 766 can include logic for performing the DCT protocol or process discussed with respect to FIGS. 4 and 5 .
- the memory 762 can be used to store an egress forwarding policy table, such as egress forwarding policy table 336 of FIG. 3 , and an ingress security policy table, such as ingress security policy table 338 of FIG. 3 .
- FIG. 7B illustrates an example embodiment of a public cloud network gateway 712 , such as the public cloud network gateway 112 of FIG. 1 .
- the public cloud network gateway 712 can include hardware 768 and public cloud network gateway software, such as an Input/Output (I/O) interface 770 and a DCT protocol module 772 .
- I/O interface 770 can enable the public cloud network gateway 712 to communicate with components located within the same public cloud as the gateway, as well as with other public cloud network gateways and with a private cloud (e.g., private cloud 102 of FIG. 1 ) (not shown).
- I/O interface 770 can enable the public cloud network gateway 712 to communicate with components located within the same public cloud as the gateway, as well as with other public cloud network gateways and with a private cloud (e.g., private cloud 102 of FIG. 1 ) (not shown).
- I/O interface 770 can include a site-to-site tunnel interface 774 , an inter-gateway tunnel interface 776 , and an access tunnel interface 778 .
- Site-to-site tunnel interface 774 can be used by the public cloud network gateway 712 to communicate with a private cloud network gateway (e.g., private cloud network gateway 110 of FIG. 1 ) (not shown) over a secure site-to-site tunnel, such as secure site-to-site tunnel 108 of FIG. 1 .
- Inter-gateway tunnel interface 776 can be used by the public cloud network gateway 712 to communicate with other public cloud network gateways over inter-gateway tunnels, such as inter-gateway tunnels 654 a and 654 b of FIG. 6 .
- Access tunnel interface 778 can be used by the public cloud network gateway 712 to communicate with cVMs (e.g., cVM 718 ) over secure access tunnels, such as access tunnel 332 of FIG. 3 or over an overlay network, such as a VXLAN, NVGRE, NVO3, STT, or other overlay network.
- cVMs e.g., cVM 718
- an overlay network such as a VXLAN, NVGRE, NVO3, STT, or other overlay network.
- the DCT protocol module 772 can include logic for performing the DCT protocol or process discussed with respect to FIGS. 4 and 5 .
- Hardware 768 can represent any machine or apparatus that is capable of accepting, performing logic operations on, storing, or displaying data, and may include a processor 780 and memory 782 .
- Memory 782 can include, for example, a hash map, table, or other suitable data structure for storing the network address information of cVMs in the public cloud, such as an ARP cache, a cVM MAC address-to-VEM IP address mapping, a forwarding table, or other network address data structure.
- Memory 782 can also include a database or other suitable data structure for storing DCT configuration information, including security policies and security information (e.g., keys, credentials, certificates, or other authentication information) for each cVM attached to the public cloud network gateway 712 .
- Memory 782 can further include one or more tables, lists, or other data structures for storing data associated with certain operations described herein.
- the public cloud network gateway 712 , physical server 724 , and/or physical switches connected to these components can be network elements, which can encompass network appliances, servers, routers, switches, firewalls gateways, bridges, load balancers, modules, or any other suitable device, proprietary component, element, or object operable to exchange information in a network environment.
- Network elements may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
- each of the public cloud network gateway 712 , physical server 724 , and/or a physical switches connected to these components can include memory elements for storing information to be used in the operations disclosed herein.
- physical server 724 may also include virtual memory elements for storing information associated with virtual partitions, such as public cloud virtual machine 718 .
- Each of VSM 702 , virtualized system 706 , VEM 714 , and/or a connected physical switch may keep information in any suitable memory element (e.g., random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), application specific integrated circuit (ASIC), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory elements discussed herein (e.g., memory 762 and 782 ) should be construed as being encompassed within the broad term memory element or memory.
- RAM random access memory
- ROM read-only memory
- EPROM erasable programmable ROM
- EEPROM electrically erasable programmable ROM
- ASIC application specific integrated circuit
- Information being used, tracked, sent, or received by each of the public cloud network gateway 712 , physical server 724 , and/or a connected physical switch can be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term memory element or memory as used herein.
- each of the public cloud network gateway 712 , physical server 724 , and/or a connected physical switch may include software modules (e.g., DCT protocol) to achieve, or to foster operations as outlined herein.
- software modules e.g., DCT protocol
- such operations may be carried out by hardware, implemented externally to these elements, or included in some other network device to achieve the intended functionality.
- these elements may include software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein.
- one or all of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
- the optimization and/or switch overlay bypass functions outlined herein may be implemented by logic encoded in one or more tangible, non-transitory media (e.g., embedded logic provided in an application specific integrated circuit (ASIC), digital signal processor (DSP) instructions, software (potentially inclusive of object code and source code) to be executed by a processor, or other similar machine, etc.).
- the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like.
- non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
- Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network.
- the computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
- Devices implementing methods according to the subject matter of this disclosure can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
- the instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The subject matter of this disclosure relates in general to the field of computer networks, and more specifically for establishing policies to bypass a virtual switch overlay in a hybrid cloud network environment.
- Industry trends indicate a growing movement among enterprises and other entities towards hybrid cloud architectures. These enterprises and other entities may be choosing such systems so that they can acquire additional on-demand computing, storage, and network resources, and eliminating the need to build for peak capacity within their own data centers. A potential advantage of leveraging public clouds is that they may not have the same initial capital investments that may be necessary to build out a company's own private data center. Another potential benefit for public cloud is that they may better absorb a company's need for elasticity by providing almost unlimited pay-as-you-grow expansion. Although hybrid cloud designs can be conceptually and financially attractive, enterprises may be reluctant to place mission-critical applications in the public cloud because of a perception that migrating workloads from an on-premises network to a public network may significantly reduce control, security, and efficiency of enterprise applications.
- In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific examples thereof which are illustrated in the appended drawings. Understanding that these drawings depict only examples of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
-
FIG. 1 illustrates an example hybrid cloud network environment that can be utilized in an example embodiment; -
FIGS. 2A and 2B illustrate example approaches for distributing network traffic in a hybrid cloud environment that can be utilized in some example embodiments; -
FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that ofFIG. 2B ; -
FIG. 4 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in an example embodiment; -
FIG. 5 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in another example embodiment; -
FIG. 6 an example hybrid cloud network environment that can be utilized in another example embodiment; and -
FIGS. 7A and 7B illustrate example systems that can be used in various example embodiments. - The detailed description set forth below is intended as a description of various configurations of example embodiments and is not intended to represent the only configurations in which the subject matter of this disclosure can be practiced. The appended drawings are incorporated herein and constitute a part of the detailed description. The detailed description includes specific details for the purpose of providing a more thorough understanding of the subject matter of this disclosure. However, it will be clear and apparent that the subject matter of this disclosure is not limited to the specific details set forth herein and may be practiced without these details. In some instances, structures and components are shown in block diagram form in order to avoid obscuring the concepts of the subject matter of this disclosure.
- Network policies can be used to optimize the flow of network traffic between virtual machines (VMs) in a hybrid cloud environment. In an example embodiment, one or more policies can drive a virtual switch controller, a hybrid cloud manager, a hypervisor manager, a virtual switch, or other orchestrator to create one or more direct tunnels that can be utilized by a respective pair of VMs to bypass the virtual switch and enable direct communication between the VMs. The virtual switch can send the VMs network and security policies to ensure that these policies are enforced. The VMs can exchange security credentials in order to establish the direct tunnel. The direct tunnel can be used by the VMs to bypass the virtual switch and allow the VMs to communicate with each other directly.
- A computer network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between endpoints, such as personal computers and workstations. Many types of networks are available, with the types ranging from Local Area Networks (LANs) and Wide Area Networks (WANs) to overlay networks and Software-Defined Networks (SDNs).
- LANs typically connect nodes over dedicated private communications links located in the same general physical location, such as a building or campus. WANs, on the other hand, typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), or synchronous digital hierarchy (SDH) links. LANs and WANs can include layer 2 (L2) and/or layer 3 (L3) networks and devices.
- The Internet is an example of a WAN that connects disparate networks throughout the world, providing global communication between nodes on various networks. The nodes typically communicate over the network by exchanging discrete frames or packets of data according to predefined protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP). In this context, a protocol can refer to a set of rules defining how the nodes interact with each other. Computer networks may be further interconnected by an intermediate network node, such as a router, to extend the effective size of each network.
- Overlay networks generally allow virtual networks to be created and layered over a physical network infrastructure. Overlay network protocols, such as Virtual Extensible LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), Network Virtualization Overlays (NVO3), and Stateless Transport Tunneling (STT), can provide a traffic encapsulation scheme to allow network traffic to be carried across L2 and L3 networks over a logical tunnel.
- Overlay networks can also include virtual segments, such as VXLAN segments in a VXLAN overlay network, which can include virtual L2 and/or L3 overlay networks over which virtual machines (VMs) communicate. The virtual segments can be identified through a virtual network identifier (VNI), such as a VXLAN network identifier, which can specifically identify an associated virtual segment or domain.
- Network virtualization allows hardware and software resources to be combined in a virtual network. For example, network virtualization can allow multiple numbers of VMs to be attached to the physical network via respective virtual LANs (VLANs). The VMs can be grouped according to their respective VLAN, and can communicate with other VMs as well as other devices on the internal or external network.
- Cloud computing can also be provided in a network to provide computing services using shared resources. Cloud computing can generally include Internet-based computing in which computing resources are dynamically provisioned and allocated to client or user computers or other devices on-demand, from a collection of resources available via the network (e.g., “the cloud”). Cloud computing resources, for example, can include any type of resource, such as computing, storage, and networking, among others. For instance, resources may include service devices (firewalls, deep packet inspectors, traffic monitors, load balancers, etc.), compute/processing devices (servers, CPUs, GPUs, random access memory, caches, etc.), and storage devices (e.g., network attached storages, storage area network devices, hard disk drives, solid-state devices, etc.), among others. In addition, such resources may be used to support virtual networks, VMs, databases, applications (“apps”), etc.
- Cloud computing resources may include a “private cloud,” a “public cloud,” and/or a “hybrid cloud.” A “private cloud” can be a cloud infrastructure operated by an enterprise for use by the enterprise, while a “public cloud” can be a cloud infrastructure that provides services and resources over a network for public use. A “hybrid cloud” can be a cloud infrastructure composed of two or more clouds that inter-operate or federate through cloud orchestration, cloud management, cloud automation, or similar technologies. A hybrid cloud can be thought of as an interaction between private and public clouds where a private cloud joins a public cloud and utilizes public cloud resources in a secure and scalable manner.
-
FIG. 1 illustrates an example hybridcloud network environment 100 that can be utilized in an example embodiment. Hybridcloud network environment 100 can include a plurality of networks or clouds, such as a private cloud 102 (e.g., an enterprise virtual datacenter) and apublic cloud 104 separated by a WAN 106, such as the Internet. Although a hybrid cloud is sometimes defined as consisting of a private cloud and a public cloud, it should be understood that many aspects of this disclosure can be practiced in various configurations (e.g., two or more public clouds hosted by third party cloud providers and/or two or more private clouds of an enterprise located in different locations). Theprivate cloud 102 and thepublic cloud 104 can be integrated using overlay network techniques, such as VXLAN, NVGRE, NVO3, STT, or other overlay network protocols known to those of ordinary skill. Theprivate cloud 102 andpublic cloud 104 can be connected via a site-to-site tunnel orcommunication link 108 between a privatecloud network gateway 110 and a publiccloud network gateway 112. The privatecloud network gateway 110 can be configured as a VM for extending the private cloud across the Internet to thepublic cloud 104 through the site-to-site tunnel 108. The publiccloud network gateway 112 can be configured as a VM switch overlay for interconnecting workloads running in thepublic cloud 104 via secure access tunnels, and for forwarding network traffic to theprivate network 102 using the site-to-site tunnel 108. In an example embodiment, the privatecloud network gateway 110 can be implemented using Intercloud Fabric™ Extender (ICX) from Cisco®, Systems, Inc. of San Jose, Calif., the publiccloud network gateway 112 can be implemented using Intercloud Fabric™ Switch (ICS) from Cisco®, and the ICX/ICS pair can form an Intercloud Fabric™ Cloud (ICFCloud). - In some example embodiments, the private
cloud network gateway 110 can establish, from theprivate cloud 102, the secure site-to-site tunnel 108 to interconnect with the publiccloud network gateway 112, and interact with a virtual switch controller or Virtual Supervisor Module (VSM) 114. TheVSM 114 can serve as a network controller for managing the network and security policies of the overlay network. In an example embodiment, theVSM 114 can be implemented in an active-standby model to ensure high availability, with a first VSM functioning in a primary role and a second VSM functioning in a secondary role. If the first VSM fails, the second VSM can take over control. A virtual chassis model can be used to representVSM 114 and each virtual switch or Virtual Ethernet Module (VEM) under the VSM's control or within the VSM's domain, such asVEM 116 a in the private cloud andpublic cloud VEM 116 b. The high availability pair ofVSMs 114 can be associated with 1 and 2 in the virtual chassis, and theslot numbers 116 a and 116 b can be sequentially assigned to the remaining slots. In the virtual chassis model,VEMs VSM 114 may be configured to provide control plane functionality for the virtual switches or VEMs 116 a and 116 b. The 116 a and 116 b can provide network connectivity and switching capability for VMs hosted on a corresponding server like a line card in a modular switching platform, and can operate as part of a data plane associated with the control plane ofVEMs VSM 114. Unlike multiple line cards in a single chassis, each VEM can act as an independent switch from a forwarding perspective. In some example embodiments, the 116 a and 116 b may form a distributed virtual switch that can be controlled by theVEMs VSM 114. In an example embodiment, theVSM 114 and 116 a and 116 b can be implemented using Cisco Nexus® 1000V Series Switches.VEMs - The
private cloud 102 can also include ahybrid cloud manager 120, which can be a management plane VM for auto-provisioning resources within the hybridcloud network environment 100. Thehybrid cloud manager 120 can be a management platform running in theprivate cloud 102, and may be responsible for providing hybrid cloud operations, translating between private cloud and public cloud interfaces, managing cloud resources, instantiating cloud gateways and cloud VMs though a private virtualization platform orhypervisor manager 122 and public cloud provider application programming interfaces (APIs). Thehybrid cloud manager 120 may also monitor the health of all of the components of the network (e.g., cloud gateways, VMs, and communication links) and ensure high availability of those components. - In an example embodiment, the
hybrid cloud manager 120 can be implemented as a virtual appliance, such as the Intercloud Fabric™ Director (ICFD) from Cisco®. The ICFD can be a hybrid cloud orchestration component that can provide a single point of management and consumption of hybrid cloud resources. That is, the ICFD can offer a single console so that users can provision workloads and associated policies. The ICFD can also expose northbound APIs, which allow users to programmatically manage their workloads in thehybrid cloud environment 100 or integrate with other cloud management platforms. - The
private cloud 102 can include one or morephysical servers 124 that each deploy a hypervisor 126 (also sometimes referred to as a virtual machine manager or a virtual machine monitor (VMM)). Thehypervisor 126 may be computer software, firmware, or hardware that creates and runs one or more VMs, such asVMs 128 orcVMs 118. Although thecVMs 118 are not shown to be encapsulated by a hypervisor in this example, it will be appreciated that VMs may or may not be managed by a hypervisor. Thehypervisor 126 can provide a respective operating system to one or more VMs. In some example embodiments, thehypervisor 126 may be a native or “bare metal” hypervisor that runs directly on hardware, but that may alternatively run under host software executing on hardware. Thehypervisor 126 can be managed by the virtualization platform orhypervisor manager 122, such as vSphere® from VMware®, Inc. of Palo Alto, Calif., Hyper-V® from Microsoft® Corp. of Seattle, Wash., XenServer® from Citrix® Systems, Inc. of Santa Clara, Calif., or Red Hat® Enterprise Virtualization from Red Hat®, Inc. of Raleigh, N.C. - Each VM, including
VMs 128 andcVMs 118, can host a private application. In some example embodiments, eachpublic cloud VM 118 may be connected to the publiccloud network gateway 112 via secure access tunnels, as discussed elsewhere herein. In some example embodiments, one or more cVMs 118 can be configured to operate as a public cloud firewall (not shown), such as an Intercloud Fabric™ Firewall or Virtual Security Gateway (VSG) from Cisco®. In some example embodiments, one or more cVMs 118 can be configured to operate as a public cloud router (not shown), such as an Intercloud Fabric™ Router or Cloud Services Router (CSR) from Cisco®. - In some example embodiments, the public
cloud network gateway 112 can establish, from thepublic cloud 104, the secure site-to-site tunnel 108 to interconnect with the privatecloud network gateway 110, secure access tunnels to connect public cloud VMs (cVMs) 118, and monitor and report statistics for the public cloud VMs and any component failures in thepublic cloud 104. In some example embodiments, the privatecloud network gateway 110 and the publiccloud network gateway 112 can be deployed as a high-availability pair to provide redundancy. In some example embodiments, the publiccloud network gateway 112 can include a cloud virtual switch or cloud Virtual Ethernet Module (cVEM) 116 b that communicates with theVSM 114 to retrieve VM-specific network policies (e.g., port profiles), switches network traffic betweenpublic cloud VMs 118, switches network traffic between public cloud VMs and theprivate cloud 102, applies network policies, and monitors and reports VEM-related statistics. - In some example embodiments, each physical server, such as
physical server 124, hosting a VM, includingVM 128 andcVM 118, can include multiple Virtual Network Interface Cards (VNICs) (not shown) for providing specific functionality, such as control and/or data/packet transmission. For example, a VM on a physical server can include a vNIC that may be connected to a VEM, such asVEM 116 a orcVEM 116 b, for connecting the VM or cVM to the network. Eachphysical server 124 can include a vNIC for enabling control functionality, such as Small Computer Systems Interface over IP (iSCSI), Network File System (NFS) access, migration of VMs or cVMs, directly connected tunnels, discussed elsewhere herein, as well as other control functionality. - In some example embodiments, each
public cloud VM 118 can include an agent (not shown) that provides for the network overlay logic for the public cloud VM. The agent can be deployed in the cVM as a secure tunnel driver. The agent can establish a secure access tunnel to connect thepublic cloud VM 118 to the publiccloud network gateway 112, and monitor and report secure overlay-related statistics. In an example embodiment, the agent can be implemented using Intercloud Fabric™ Agent (ICA) from Cisco®. - In some example embodiments, the secure site-to-site tunnel or
communication link 108 can take one of several forms, such as various types of virtual private networks (VPNs) or Layer 2 (L2) tunneling protocols. For example, some example embodiments may utilize an open VPN (e.g., OpenVPN) overlay or an IP Security (IPSec) VPN based L3 network extension to provide thecommunication link 108. Some example embodiments may utilize a secure transport layer (i.e., L4) tunnel as thecommunication link 108 between the privatecloud network gateway 110 and the publiccloud network gateway 112, where the securetransport layer tunnel 108 can be configured to provide a link layer (i.e., L2) network extension between theprivate cloud 102 and thepublic cloud 104. Some example embodiments may establish the secure transport layer (i.e., L4) tunnel 108 (e.g., Transport Layer Security (TLS), Datagram TLS (DTLS), Secure Socket Layer (SSL), etc.) over thepublic network 104, and can build a secure L2 switch overlay that interconnects public cloud resources with private clouds (e.g., enterprise network backbones). In other words, the securetransport layer tunnel 108 can provide a link layer network extension between theprivate cloud 102 and thepublic cloud 104. - In an example embodiment, the private
cloud network gateway 110 can use an L4 secure tunnel as thecommunication link 108 to connect to the cloud resources allocated in thepublic cloud 104. The L4 secure tunnel may be well-suited for use with corporate firewalls and Network Address Translation (NAT) devices due to the nature of the transport level protocols (e.g., UDP/TCP) and the transport layer ports opened for HTTP/HTTPS in the firewall. The L2 network can thus be further extended and connected to each of thecloud VMs 118 through the publiccloud network gateway 112. With an L2 network overlay, instances of a particular private application VM can be seamlessly migrated to the overlay network dynamically created in thepublic cloud 104, without substantial impact to existing corporate infrastructure. -
FIGS. 2A and 2B illustrate example approaches for distributing VM-to-VM network traffic in apublic cloud 204 of a hybrid cloud network that can be utilized in some example embodiments. InFIG. 2A , thepublic cloud environment 204 can include a publiccloud network gateway 212 and 218 a, 218 b, 218 c, and 218 d. For example, a cloud manager (e.g.,public cloud VMs cloud manager 120 ofFIG. 1 ) (not shown) can be used to deploy an intercloud fabric for integrating a private cloud (e.g.,private cloud 102 ofFIG. 1 ) (not shown) with a public cloud, such as thepublic cloud 204. The cloud manager can interface with a hypervisor manager (e.g.,hypervisor manager 122 ofFIG. 1 ) (not shown) to instantiate a VM (e.g.,VM 128 ofFIG. 1 ) (not shown) in the private cloud and configure the VM to operate as a private cloud network gateway (e.g., privatecloud network gateway 110 ofFIG. 1 ) (not shown). The cloud manager can also interface with a hypervisor manager in thepublic cloud 204 or cloud provider APIs to instantiate a plurality of public cloud VMs (e.g., 218 a, 218 b, 218 c, or 218 d). One or more of the cVMs can be configured to operate as the publiccVMs cloud network gateway 212. One or more of the cVMs can be configured to operate as a public cloud firewall (not shown). One or more of the cVMs can be configured to operate as a public cloud router (not shown). One or more of the cVMs can be configured for migrating workloads from the private cloud to thepublic cloud 204. - The cloud manager can also establish a site-to-site tunnel or
secure network extension 208 between the private cloud network gateway and the publiccloud network gateway 212. As discussed, in some example embodiments, a publiccloud VM agent 230 can be utilized to provide a compute environment and network overlay for the 218 a, 218 b, 218 c, and 218 d. Thepublic cloud VMs cVMA 230 can be deployed in a public cloud VM as a secure tunnel driver that runs within the public cloud VM's operating system. Theagent 230 can cause a cVM to direct network traffic to the secure overlay network by establishing a secure tunnel (e.g., 232 a and 232 b) to connect to the publicaccess tunnels cloud network gateway 212 for allowing the cVMs to communicate with private cloud VMs and other public cloud VMs. ThecVMA 230 can also collect secure overlay-related statistics. - In the
public cloud 204, theaccess tunnel 232 a can be used for secure communications between 218 a and 218 d, and thecVM access tunnel 232 b can be used for secure communications betweenpublic cloud VM 218 b andpublic cloud VM 218 c. For instance, if thepublic cloud VM 218 a desires to send a packet to thepublic cloud VM 218 d, the packet can first be sent to the publiccloud network gateway 212, where network and security policy may be enforced. Then the publiccloud network gateway 212 may forward the packet to thecVM 218 d. That is, packets sent betweencVMs 218 a andcVM 218 d may pass through the publiccloud network gateway 212 before arriving at the packets' intended destinations. - In certain situations, the public
cloud network gateway 212 can become a bottleneck for a hybrid cloud network, such as when the public cloud network gateway is used to connect a large number of cVMs and/or large-sized cVMs. Under these circumstances, an alternative or additional process can be used for enabling communications between cVMs.FIG. 2B illustrates an example approach. InFIG. 2B , a direct connection or Directly Connected Tunnel (DCT) 234 a may be established betweencVM 218 a andcVM 218 d, and a direction connection orDCT 234 b may be established between 218 b and 218 c. Network traffic betweencVM 218 a and 218 d can bypass the publiccVMs cloud network gateway 212 by transmitting the traffic through the directlyconnected tunnel 234 a. Likewise, communications between 218 b and 218 c can bypass the publiccVMs cloud network gateway 212 by sending the communications over the directlyconnected tunnel 234 b. - As used herein, a direct connection or DCT can refer to a direct connection from an overlay network perspective rather than a direct physical connection. For example,
218 a and 218 d may not be directly connected to a same Ethernet (L2) hub, but can achieve L2 adjacency via VXLAN, NVGRE, NVO3, STT, or other suitable overlay network protocol. For instance,cVMs access tunnel 232 a may be referred to as an indirect tunnel because traffic between 218 a and 218 d includes a hop over the publiccVMs cloud network gateway 212.DCT 234 a can be referred to as a direct tunnel because it does not include such hop. Although DCTs can reduce bandwidth requirements of the publiccloud network gateway 212 and minimize the chances of the public cloud network gateway becoming a bottleneck for the hybrid cloud network, bypassing the public cloud network gateway may also result in network and security policy becoming unenforced. -
FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that ofFIG. 2B . InFIG. 3 , thepublic cloud environment 304 can include a publiccloud network gateway 312 interconnected with 318 a and 318 b. Thepublic cloud VMs cVM 318 a can be assigned IP address 10.10.10.10 and MAC address aa.aa.aa, and thecVM 318 b can be assigned IP address 20.20.20.20 and MAC address bb.bb.bb. The 318 a and 318 b may be indirectly connected via acVMs secure access tunnel 332. That is, traffic between these cVMs transmitted along the access tunnel at one endpoint of the access tunnel can include a hop over the publiccloud network gateway 312 before arriving at the other end of the access tunnel. Thesecure access tunnel 332 can be associated withtunnel identifier 1. The 318 a and 318 b may also be directly connected via a direct connection orcVMs DCT 334. TheDCT 334 can be associated withtunnel identifier 2. - By default, the
318 a and 318 b can communicate with each other through the secure access tunnel 332 (and through the public cloud network gateway 312). The publiccVMs cloud network gateway 312 can establish theaccess tunnel 332 as a default access tunnel during the initial deployment of a cVM and have network traffic between cVMs pass through the public cloud network gateway as a default forwarding policy. For example,cVM 318 a's egress forwarding table 336 can be initialized to include an entry of “*” or all addresses for the destination IP address, “*” or all addresses for the destination MAC address, and a tunnel identifier of 1 to indicate that cVM 318's egress traffic should be forwarded on thedefault access tunnel 1, i.e., forwarded to the publiccloud network gateway 312. ThecVM 318 b can have a similar egress forwarding table including a similar default forwarding policy. In the example embodiment ofFIG. 3 , thecVM 318 b may have a default security policy or Access Control List (ACL) that denies all incoming traffic, which can be represented in thecVM 318 b's ingress security policy table 338 as an entry including “*” or all addresses for the source address, “*” or all tunnels for the tunnel identifier, and a “Deny” rule for dropping incoming traffic corresponding to the source address and source tunnel. ThecVM 318 a may include a similar ingress security policy table with a default security policy or ACL. - To optimize network traffic flow in the
public cloud environment 304 and ensure that security policy is enforced, policies can be defined for connecting a first cVM to a second cVM via a DCT. In an example embodiment, a DCT policy can be on-demand or enforced when any cVM mutually connected to a same public cloud network gateway attempt to communicate with one another. For instance, the public cloud network gateway can be configured to orchestrate the creation of a DCT tunnel between a pair of cVMs based on an initial attempted cVM-to-cVM communication via a secure access tunnel, such as an Address Resolution Protocol (ARP) request. In another example embodiment, a DCT policy can be application-driven or enforced by a cloud orchestration component (e.g., theVSM 114 ofFIG. 1 ,cloud manager 120 ofFIG. 1 ,hypervisor manager 122 ofFIG. 1 , or other suitable management interface) based on application network profiles or requirements (e.g., Application Network Profiles (ANPs) in the Cisco Application Centric Infrastructure (Cisco ACI™)). For instance, the management interface can be utilized to configure a public cloud network gateway to set up one or more DCTs among a set of cVMs connected to the gateway based on the application network profiles or requirements. - In an example embodiment, a DCT policy can be statistics-driven or enforced according to metrics relating to the hybrid cloud network. For instance, a cVM agent and/or public cloud network gateway can monitor latency, bandwidth, throughput, response time, or other suitable processing and/or network performance measurement until such measurement is below a threshold, above a threshold, or otherwise satisfies a threshold condition. Upon satisfying the threshold condition, the public cloud network gateway can establish one or more DCTs to address the threshold condition. For example, a public cloud network gateway can be configured to create DCTs on-demand once CPU utilization reaches an upper bound and can revert to a previous network policy when CPU utilization is below a lower bound. As another example, a cVM agent can monitor and report network latency to a VSM (e.g., the
VSM 114 ofFIG. 1 ), cloud manager (e.g.,cloud manager 120 ofFIG. 1 ), hypervisor manager (e.g.,hypervisor manager 122 ofFIG. 1 ), or other suitable management interface. When network latency for the cVM reaches a minimum criterion, the management interface can direct the public cloud network gateway to establish one or more DCTs for that cVM to alleviate the network latency. In various example embodiments, other policies can be defined for establishing DCTs as would be known to one of ordinary skill in the art. - To establish the
DCT 334 between thecVMs 318 a and 316 b, the publiccloud network gateway 312 can send network address information and security information (e.g., keys credentials, certificates, or other authentication information) 340 relating tocVM 318 b to thecVM 318 a over thesecure access tunnel 332. This can cause the egress forwarding policy table 336 to be updated with an entry, such as “20.20.20.20” for the destination IP address, “bb.bb.bb” for the destination MAC address, andtunnel identifier 2, indicating that traffic intended for thecVM 318 b sent by thecVM 318 a should be delivered overdirect tunnel 334. The publiccloud network gateway 312 can also sendsecurity policy information 342 to ensure applicable security policies are enforced. In this example, thesecurity policy information 342 can cause the ingress security policy table 338 to be populated with an entry comprising “10.10.10.10” for a source address,tunnel identifier 2, and an “Allow” rule, which indicates that traffic originating from the source address sent over theDCT 334 can be accepted by thecVM 318 b. In an example embodiment, physical 318 a and 318 b can include control interfaces that can be used to form aservers hosting cVMs control tunnel 344 between 318 a and 318 b. The first cVM's address andcVMs security information 340 and the second cVM'ssecurity policy information 342 can be sent over thecontrol tunnel 344. In another example embodiment, such information can be sent over thesecure access tunnel 332. -
FIG. 4 illustrates an example data flow diagram 400 for establishing communications between VMs in a hybrid cloud environment that can be utilized in an example embodiment. Data flow diagram 400 may be used for enforcing an on-demand DCT policy, such as when a network is configured to establish a DCT tunnel upon any attempted communication between cVMs connected to the gateway, or the network has defined a statistics-driven DCT policy and a threshold condition corresponding to the policy is satisfied. In this example embodiment, afirst VM 418 a and asecond VM 418 b are each connected to a virtual switch or publiccloud network gateway 412. Asecure access tunnel 432 can be established between the cVMs during their deployment. Theaccess tunnel 432 can include a hop over the publiccloud network gateway 412. ThecVM 418 a's forwarding table (e.g., egress forwarding policy table 336 ofFIG. 3 ) can be initialized with a default rule to send egress traffic to the publiccloud network gateway 412 over theaccess tunnel 432. ThecVM 418 b's forwarding table may include a similar entry. The respective physical 418 a and 418 b may include respective control interfaces such that aservers hosting cVMs control tunnel 444 can also be created between 418 a and 418 b.cVMs - The
first cVM 418 a can attempt to communicate with thesecond cVM 418 b, and may begin at 402 by sending an ARP request to the virtual switch or publiccloud network gateway 412 to determine network address information for the second cVM. The ARP request can be sent over thesecure access tunnel 432 based on the first cVM's default forwarding rule. Upon receiving the ARP request at 404, the virtual switch or publiccloud network gateway 412 can resolve the requested network address information such as by looking up the requested network address in the switch's ARP cache to identify the MAC address of thesecond cVM 418 b. Theswitch 412 can also retrieve the second cVM's security information, such as keys, credentials, certificates, or other information necessary for establishing a DCT with thesecond cVM 418 b. Keys, credentials, or certificates can include passwords, private keys generated from public-key cryptography methods (e.g., Rivest-Shamir-Adleman (RSA), Digital Signature Algorithm (DSA), Elliptical Curve Digital Signature Algorithm (ECDSA), Diffie-Helman (DH), Elliptic Curve Diffie-Hellman (ECDH)), or secret keys generated from symmetric-key cryptography methods (e.g., International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), Triple-DES, Advanced Encryption Standard (AES), ARCFOUR (RC4), Blowfish, Twofish, Carlisle Adams Stafford Tavares (CAST), etc. In various example embodiments, other authentication methods (e.g., Kerberos, NT LAN Manager (NTLM), and keyboard-interactive, etc.), and new authentication methods as they become available. Theswitch 412 can send the ARP reply to thefirst cVM 418 a over thedefault tunnel 432. The DCT configuration information can be piggybacked onto the ARP reply. - The
virtual switch 412 can also fetch the security policy rules relevant to thesecond cVM 418 b and may send the security policies to the second cVM's control interface at 406. At 408, after thefirst cVM 418 a has received the ARP reply and the second cVM's security information, the first cVM can begin the DCT establishment process or protocol by sending a DCT connection request to thesecond cVM 418 b over thecontrol tunnel 444. The DCT connection request can include information for authenticating thefirst cVM 418 a derived from the second cVM's security information, as well as keys, credentials, certificates, or other information necessary to establish a DCT with the first cVM. - At 410, after the
second cVM 418 b can receive the security policies from thevirtual switch 412 and the DCT connection request from thefirst cVM 418 a, the second cVM may attempt to authenticate the first cVM using the first cVM's authentication information within the DCT connection request. Upon authentication of thefirst cVM 418 a, thesecond cVM 418 b can establish itself as one endpoint of theDCT 434, such as by updating its ingress security policy table using the received security policies. Thesecond cVM 418 b may then send a DCT connection reply that includes information authenticating the second cVM with information derived from the first cVM's security information. As a part of the DCT establishment process or protocol, thesecond cVM 418 b may also update its egress forwarding table with an entry for forwarding egress traffic to thefirst cVM 418 a through theDCT 434. - At 413, after the
first cVM 418 a has received the DCT connection reply, the first cVM may attempt to authenticate thesecond cVM 418 b using the second cVM's authentication information within the DCT connection reply. If thesecond cVM 418 b is authenticated, thefirst cVM 418 a may establish itself as the other endpoint of theDCT 434, such as by updating its egress forwarding policy table with an entry forwarding traffic to the second cVM through the DCT. Thefirst cVM 418 a may subsequently send its application traffic directly to thesecond cVM 418 b via theDCT 434 at 414, and thesecond cVM 418 b can send its application traffic directly to thefirst cVM 418 a via theDCT 434 at 416. -
FIG. 5 illustrates an example data flow diagram 500 for establishing communications between VMs in a hybrid cloud environment that can be utilized in another example embodiment. Data flow diagram 500 may be used for enforcing an application-driven DCT policy. For instance, instead of being acted upon according to real-time cVM-to-cVM traffic, such as in the case with an on-demand or statistics-driven DCT policy, an application-driven policy may be based on ANPs or application network requirements. Thus, it may be required to have prior knowledge of the application-level network topology and security requirements of an application before its deployment. Another difference between data flow diagrams 400 and 500 may lie in the first few steps of each process. That is 502 and 504 of the data flow diagram 500 may differ from 402 and 404 of the data flow diagram 400 but 506 through 516 of the data flow diagram 500 may be the same or substantially similar to 406 through 416 of the data flow diagram 400. - The data flow diagram 500 may begin by defining an ANP based on prior knowledge of the application's network and security requirements. The ANP can include configuration of endpoints (e.g., network and security policies) and security information (e.g., keys, credentials, certificates, or other authentication information. A cloud orchestration component 546 (e.g., the
VSM 114 ofFIG. 1 ,cloud manager 120 ofFIG. 1 ,hypervisor manager 122 ofFIG. 1 , or other management interface) can be used to push the ANP to a virtual switch or publiccloud network gateway 512 over acontrol tunnel 544 at 502. In another example embodiment, the ANP can be sent through a secure access tunnel. Based on receiving the ANP from thecloud orchestrator 546, thevirtual switch 512 can build one ormore DCT tunnels 534 between various VM pairs (e.g., 518 a and 518 b) one-by-one until each application node, configured to bypass the virtual switch according to the ANP, is connected to a DCT. For example, thecVMs virtual switch 512 can send DCT configuration to one or more cVMs over thecontrol tunnel 544. In another example embodiment, the DCT configuration information can be sent over a secure access tunnel. As discussed, 506 through 516 can be the same or substantially the same as 406 through 416 ofFIG. 4 . -
FIG. 6 illustrates an example hybridcloud network environment 600 that can be utilized in another example embodiment. The hybridcloud network environment 600 can include a private cloud (e.g.,private cloud 102 ofFIG. 1 ) (not shown) interconnected to apublic cloud 604 via a secure network extension or site-to-site tunnel 608. Thepublic cloud 604 can comprise a plurality of hosts, such as aweb host 648, anapplication host 650, and adatabase host 652. Each host can be implemented as a virtual machine or a bare metal host. Theweb host 648 can include a publiccloud network gateway 612 a that interconnects the host to the private cloud by the secure site-to-site tunnel 608. The publiccloud network gateway 612 a can also interconnect theweb host 648 to theapplication host 650 by a secureinter-gateway tunnel 654 a. - The
web host 648 can also include 656 a and 656 b. In an example embodiment, the publicweb containers cloud network gateway 612 a can also be implemented as a container. A container is a kind of lightweight virtual machine utilized in operating system level virtualization. Operating system level virtualization is a type of server virtualization in which the kernel of an operating system may be capable of providing multiple isolated user space instances or containers. Unlike whole system server virtualization, in which a single server can host multiple operating systems, operating system level virtualization can be used to partition a single operating system among multiple containers. Containers may use less memory and CPU than whole system VMs running similar workloads because only a single kernel may be executed using containers whereas multiple kernels may be executed using whole system VMs. However, containers can raise security concerns not applicable to whole system VMs due to operating system resources being shared. - The
application host 650 can include a publiccloud network gateway 612 b and 656 c and 656 d. The publicapplication containers cloud network gateway 612 b can be used to interconnect theapplication host 650 to theweb host 648 via the secureinter-gateway tunnel 654 a, and theapplication host 650 to thedatabase host 652 via the secureinter-gateway tunnel 654 b. Thedatabase host 652 can include a publiccloud network gateway 612 c anddatabase container 656 e. As illustrated inFIG. 6 , thepublic cloud 604 can be used to implement a conventional multi-tier or three-tier architecture including a web or presentation tier corresponding to theweb host 648, an application or logic tier corresponding to theapplication host 650, and a data or database tier corresponding to thedatabase host 652. - In the example embodiment of
FIG. 6 , one or more application-driven DCT policies can be applied to thepublic cloud network 604 to create the multi-tier application architecture and the secure 654 a and 654 b. Using this approach, the public cloud network gateways can provide default network connectivity to every container (e.g., via access tunnels) while optimizing network traffic flow by using the DCTs as a primary data path for exchanging application traffic.inter-gateway tunnels -
FIG. 7A illustrates an example embodiment of aphysical server 724, such asphysical server 124 ofFIG. 1 . Thephysical server 724 can includehardware 758, a hypervisor 726 (e.g.,hypervisor 126 ofFIG. 1 ), and a public cloud virtual machine 718 (e.g.,cVM 118 ofFIG. 1 ).Hardware 758 can represent any machine or apparatus capable of accepting, performing logic operations on, storing, or displaying data, and may include aprocessor 760 andmemory 762. In this example embodiment, a cVM agent 730 (e.g.,cVM agent 230 ofFIG. 2 ) can be installed on thecVM 718 when the cVM is deployed on thephysical server 724. ThecVM agent 730 can include software, such as anetwork overlay module 764 and aDCT protocol module 766. Thenetwork overlay module 764 can be used to provide a compute environment and network overlay for thecVM 718, and can include logic for establishing a secure tunnel (e.g.,access tunnel 332 ofFIG. 3 ) to connect thecVM 718 to a public cloud network gateway (not shown). TheDCT protocol module 766 can include logic for performing the DCT protocol or process discussed with respect toFIGS. 4 and 5 . Thememory 762 can be used to store an egress forwarding policy table, such as egress forwarding policy table 336 ofFIG. 3 , and an ingress security policy table, such as ingress security policy table 338 ofFIG. 3 . -
FIG. 7B illustrates an example embodiment of a publiccloud network gateway 712, such as the publiccloud network gateway 112 ofFIG. 1 . The publiccloud network gateway 712 can includehardware 768 and public cloud network gateway software, such as an Input/Output (I/O)interface 770 and aDCT protocol module 772. I/O interface 770 can enable the publiccloud network gateway 712 to communicate with components located within the same public cloud as the gateway, as well as with other public cloud network gateways and with a private cloud (e.g.,private cloud 102 ofFIG. 1 ) (not shown). - I/
O interface 770 can include a site-to-site tunnel interface 774, aninter-gateway tunnel interface 776, and anaccess tunnel interface 778. Site-to-site tunnel interface 774 can be used by the publiccloud network gateway 712 to communicate with a private cloud network gateway (e.g., privatecloud network gateway 110 ofFIG. 1 ) (not shown) over a secure site-to-site tunnel, such as secure site-to-site tunnel 108 ofFIG. 1 .Inter-gateway tunnel interface 776 can be used by the publiccloud network gateway 712 to communicate with other public cloud network gateways over inter-gateway tunnels, such as 654 a and 654 b ofinter-gateway tunnels FIG. 6 .Access tunnel interface 778 can be used by the publiccloud network gateway 712 to communicate with cVMs (e.g., cVM 718) over secure access tunnels, such asaccess tunnel 332 ofFIG. 3 or over an overlay network, such as a VXLAN, NVGRE, NVO3, STT, or other overlay network. - The
DCT protocol module 772 can include logic for performing the DCT protocol or process discussed with respect toFIGS. 4 and 5 .Hardware 768 can represent any machine or apparatus that is capable of accepting, performing logic operations on, storing, or displaying data, and may include aprocessor 780 andmemory 782.Memory 782 can include, for example, a hash map, table, or other suitable data structure for storing the network address information of cVMs in the public cloud, such as an ARP cache, a cVM MAC address-to-VEM IP address mapping, a forwarding table, or other network address data structure.Memory 782 can also include a database or other suitable data structure for storing DCT configuration information, including security policies and security information (e.g., keys, credentials, certificates, or other authentication information) for each cVM attached to the publiccloud network gateway 712.Memory 782 can further include one or more tables, lists, or other data structures for storing data associated with certain operations described herein. - In an example embodiment, the public
cloud network gateway 712,physical server 724, and/or physical switches connected to these components (not shown) can be network elements, which can encompass network appliances, servers, routers, switches, firewalls gateways, bridges, load balancers, modules, or any other suitable device, proprietary component, element, or object operable to exchange information in a network environment. Network elements may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information. - In regards to the internal structure associated with the above network elements, each of the public
cloud network gateway 712,physical server 724, and/or a physical switches connected to these components (not shown) can include memory elements for storing information to be used in the operations disclosed herein. Additionally,physical server 724 may also include virtual memory elements for storing information associated with virtual partitions, such as public cloudvirtual machine 718. Each of VSM 702, virtualized system 706, VEM 714, and/or a connected physical switch may keep information in any suitable memory element (e.g., random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), application specific integrated circuit (ASIC), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory elements discussed herein (e.g.,memory 762 and 782) should be construed as being encompassed within the broad term memory element or memory. Information being used, tracked, sent, or received by each of the publiccloud network gateway 712,physical server 724, and/or a connected physical switch can be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term memory element or memory as used herein. - In an example embodiment, each of the public
cloud network gateway 712,physical server 724, and/or a connected physical switch may include software modules (e.g., DCT protocol) to achieve, or to foster operations as outlined herein. In other example embodiments, such operations may be carried out by hardware, implemented externally to these elements, or included in some other network device to achieve the intended functionality. Alternatively, these elements may include software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein. In still other embodiments, one or all of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof. - For clarity of explanation, in some instances the subject matter of this disclosure may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
- Note that in certain example embodiments, the optimization and/or switch overlay bypass functions outlined herein may be implemented by logic encoded in one or more tangible, non-transitory media (e.g., embedded logic provided in an application specific integrated circuit (ASIC), digital signal processor (DSP) instructions, software (potentially inclusive of object code and source code) to be executed by a processor, or other similar machine, etc.). The computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
- Methods according to the above-described example embodiments can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
- Devices implementing methods according to the subject matter of this disclosure can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
- The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
- Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/876,627 US11005682B2 (en) | 2015-10-06 | 2015-10-06 | Policy-driven switch overlay bypass in a hybrid cloud network environment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/876,627 US11005682B2 (en) | 2015-10-06 | 2015-10-06 | Policy-driven switch overlay bypass in a hybrid cloud network environment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20170099188A1 true US20170099188A1 (en) | 2017-04-06 |
| US11005682B2 US11005682B2 (en) | 2021-05-11 |
Family
ID=58446911
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/876,627 Active 2037-03-22 US11005682B2 (en) | 2015-10-06 | 2015-10-06 | Policy-driven switch overlay bypass in a hybrid cloud network environment |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US11005682B2 (en) |
Cited By (121)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170085473A1 (en) * | 2014-06-03 | 2017-03-23 | Huawei Technologies Co., Ltd. | OPENFLOW Communication Method and System, Controller, and Service Gateway |
| US20170171298A1 (en) * | 2015-12-09 | 2017-06-15 | Intel Corporation | Enhanced virtual switch for network function virtualization |
| US20180007123A1 (en) * | 2016-06-30 | 2018-01-04 | Alibaba Group Holding Limited | Express route transmissions between virtual machines and cloud service computing devices |
| CN107547258A (en) * | 2017-07-18 | 2018-01-05 | 新华三云计算技术有限公司 | The implementation method and device of a kind of network strategy |
| US9935894B2 (en) | 2014-05-08 | 2018-04-03 | Cisco Technology, Inc. | Collaborative inter-service scheduling of logical resources in cloud platforms |
| US10034201B2 (en) | 2015-07-09 | 2018-07-24 | Cisco Technology, Inc. | Stateless load-balancing across multiple tunnels |
| US10037617B2 (en) | 2015-02-27 | 2018-07-31 | Cisco Technology, Inc. | Enhanced user interface systems including dynamic context selection for cloud-based networks |
| US10050862B2 (en) | 2015-02-09 | 2018-08-14 | Cisco Technology, Inc. | Distributed application framework that uses network and application awareness for placing data |
| US10067780B2 (en) | 2015-10-06 | 2018-09-04 | Cisco Technology, Inc. | Performance-based public cloud selection for a hybrid cloud environment |
| US10084703B2 (en) | 2015-12-04 | 2018-09-25 | Cisco Technology, Inc. | Infrastructure-exclusive service forwarding |
| US20180278478A1 (en) * | 2017-03-24 | 2018-09-27 | Cisco Technology, Inc. | Network Agent For Generating Platform Specific Network Policies |
| US10122605B2 (en) | 2014-07-09 | 2018-11-06 | Cisco Technology, Inc | Annotation of network activity through different phases of execution |
| US10129177B2 (en) | 2016-05-23 | 2018-11-13 | Cisco Technology, Inc. | Inter-cloud broker for hybrid cloud networks |
| US10142346B2 (en) | 2016-07-28 | 2018-11-27 | Cisco Technology, Inc. | Extension of a private cloud end-point group to a public cloud |
| US10205677B2 (en) | 2015-11-24 | 2019-02-12 | Cisco Technology, Inc. | Cloud resource placement optimization and migration execution in federated clouds |
| US10212074B2 (en) | 2011-06-24 | 2019-02-19 | Cisco Technology, Inc. | Level of hierarchy in MST for traffic localization and load balancing |
| US10257042B2 (en) | 2012-01-13 | 2019-04-09 | Cisco Technology, Inc. | System and method for managing site-to-site VPNs of a cloud managed network |
| US10263898B2 (en) | 2016-07-20 | 2019-04-16 | Cisco Technology, Inc. | System and method for implementing universal cloud classification (UCC) as a service (UCCaaS) |
| US10320683B2 (en) | 2017-01-30 | 2019-06-11 | Cisco Technology, Inc. | Reliable load-balancer using segment routing and real-time application monitoring |
| US10326817B2 (en) | 2016-12-20 | 2019-06-18 | Cisco Technology, Inc. | System and method for quality-aware recording in large scale collaborate clouds |
| US10334029B2 (en) | 2017-01-10 | 2019-06-25 | Cisco Technology, Inc. | Forming neighborhood groups from disperse cloud providers |
| US10341371B2 (en) | 2016-08-31 | 2019-07-02 | Nicira, Inc. | Identifying and handling threats to data compute nodes in public cloud |
| US10353800B2 (en) | 2017-10-18 | 2019-07-16 | Cisco Technology, Inc. | System and method for graph based monitoring and management of distributed systems |
| US20190222574A1 (en) * | 2018-01-17 | 2019-07-18 | Vmware, Inc. | Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment |
| US10367757B2 (en) | 2016-08-27 | 2019-07-30 | Nicira, Inc. | Extension of network control system into public cloud |
| US10367914B2 (en) | 2016-01-12 | 2019-07-30 | Cisco Technology, Inc. | Attaching service level agreements to application containers and enabling service assurance |
| US10382274B2 (en) | 2017-06-26 | 2019-08-13 | Cisco Technology, Inc. | System and method for wide area zero-configuration network auto configuration |
| US10382534B1 (en) | 2015-04-04 | 2019-08-13 | Cisco Technology, Inc. | Selective load balancing of network traffic |
| US10382597B2 (en) | 2016-07-20 | 2019-08-13 | Cisco Technology, Inc. | System and method for transport-layer level identification and isolation of container traffic |
| US10419330B2 (en) | 2016-07-21 | 2019-09-17 | Alibaba Group Holding Limited | Express route transmissions between virtual machines and cloud service computing devices |
| US10425288B2 (en) | 2017-07-21 | 2019-09-24 | Cisco Technology, Inc. | Container telemetry in data center environments with blade servers and switches |
| US20190297072A1 (en) * | 2018-03-26 | 2019-09-26 | Nicira, Inc. | System and method for authentication in a public cloud |
| US10432532B2 (en) | 2016-07-12 | 2019-10-01 | Cisco Technology, Inc. | Dynamically pinning micro-service to uplink port |
| US10432450B2 (en) * | 2016-06-30 | 2019-10-01 | Microsoft Technology Licensing, Llc. | Data plane API in a distributed computing network |
| US10439877B2 (en) | 2017-06-26 | 2019-10-08 | Cisco Technology, Inc. | Systems and methods for enabling wide area multicast domain name system |
| US20190312909A1 (en) * | 2018-04-09 | 2019-10-10 | Nicira, Inc. | Method and system for applying compliance policies on private and public cloud |
| US10454984B2 (en) | 2013-03-14 | 2019-10-22 | Cisco Technology, Inc. | Method for streaming packet captures from network access devices to a cloud server over HTTP |
| US10462136B2 (en) | 2015-10-13 | 2019-10-29 | Cisco Technology, Inc. | Hybrid cloud security groups |
| US10461959B2 (en) | 2014-04-15 | 2019-10-29 | Cisco Technology, Inc. | Programmable infrastructure gateway for enabling hybrid cloud services in a network environment |
| US10476982B2 (en) | 2015-05-15 | 2019-11-12 | Cisco Technology, Inc. | Multi-datacenter message queue |
| US10491516B2 (en) | 2017-08-24 | 2019-11-26 | Nicira, Inc. | Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table |
| US10491466B1 (en) | 2018-08-24 | 2019-11-26 | Vmware, Inc. | Intelligent use of peering in public cloud |
| US10511534B2 (en) | 2018-04-06 | 2019-12-17 | Cisco Technology, Inc. | Stateless distributed load-balancing |
| US10523657B2 (en) | 2015-11-16 | 2019-12-31 | Cisco Technology, Inc. | Endpoint privacy preservation with cloud conferencing |
| CN110636115A (en) * | 2019-08-29 | 2019-12-31 | 平安医疗健康管理股份有限公司 | Cross-cloud service calling processing method, gateway server and requester server |
| US10523592B2 (en) | 2016-10-10 | 2019-12-31 | Cisco Technology, Inc. | Orchestration system for migrating user data and services based on user information |
| US10541866B2 (en) | 2017-07-25 | 2020-01-21 | Cisco Technology, Inc. | Detecting and resolving multicast traffic performance issues |
| US10552191B2 (en) | 2017-01-26 | 2020-02-04 | Cisco Technology, Inc. | Distributed hybrid cloud orchestration model |
| US20200053050A1 (en) * | 2018-08-10 | 2020-02-13 | Microsoft Technology Licensing, Llc | Virtual switch bypass |
| US10567344B2 (en) | 2016-08-23 | 2020-02-18 | Cisco Technology, Inc. | Automatic firewall configuration based on aggregated cloud managed information |
| US10567482B2 (en) | 2017-08-24 | 2020-02-18 | Nicira, Inc. | Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table |
| US20200067733A1 (en) * | 2018-08-24 | 2020-02-27 | Vmware, Inc. | Transitive routing in public cloud |
| US10601705B2 (en) | 2017-12-04 | 2020-03-24 | Nicira, Inc. | Failover of centralized routers in public cloud logical networks |
| US10601693B2 (en) | 2017-07-24 | 2020-03-24 | Cisco Technology, Inc. | System and method for providing scalable flow monitoring in a data center fabric |
| US10608865B2 (en) | 2016-07-08 | 2020-03-31 | Cisco Technology, Inc. | Reducing ARP/ND flooding in cloud environment |
| CN111049925A (en) * | 2019-12-20 | 2020-04-21 | 网易(杭州)网络有限公司 | Hybrid cloud network system, communication system and communication method |
| CN111130974A (en) * | 2018-11-01 | 2020-05-08 | 深信服科技股份有限公司 | Network intercommunication system and method based on multi-cloud environment |
| CN111124659A (en) * | 2018-11-01 | 2020-05-08 | 深信服科技股份有限公司 | Heterogeneous cloud network intercommunication system and method |
| CN111130975A (en) * | 2018-11-01 | 2020-05-08 | 深信服科技股份有限公司 | Hybrid cloud network intercommunication system and method |
| CN111225071A (en) * | 2018-11-23 | 2020-06-02 | 深信服科技股份有限公司 | Cloud platform and cross-cloud platform network intercommunication system and method |
| US10671571B2 (en) | 2017-01-31 | 2020-06-02 | Cisco Technology, Inc. | Fast network performance in containerized environments for network function virtualization |
| WO2020135221A1 (en) * | 2018-12-28 | 2020-07-02 | Alibaba Group Holding Limited | Method, apparatus, and computer-readable storage medium for network optimization for accessing cloud service from on-premises network |
| US10708342B2 (en) | 2015-02-27 | 2020-07-07 | Cisco Technology, Inc. | Dynamic troubleshooting workspaces for cloud and network management systems |
| US10705882B2 (en) | 2017-12-21 | 2020-07-07 | Cisco Technology, Inc. | System and method for resource placement across clouds for data intensive workloads |
| CN111385180A (en) * | 2018-12-28 | 2020-07-07 | 中国移动通信集团重庆有限公司 | Communication tunnel construction method, device, equipment and medium |
| CN111404801A (en) * | 2020-03-27 | 2020-07-10 | 四川虹美智能科技有限公司 | Data processing method, device and system for cross-cloud manufacturer |
| US10715597B2 (en) | 2017-06-16 | 2020-07-14 | At&T Intellectual Property I, L.P. | Methods and systems to create a network-agnostic SDN-based cloud gateway for connectivity to multiple cloud service providers |
| US10728361B2 (en) | 2018-05-29 | 2020-07-28 | Cisco Technology, Inc. | System for association of customer information across subscribers |
| US20200252234A1 (en) * | 2019-01-31 | 2020-08-06 | Juniper Networks, Inc. | Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (wan) |
| US10764266B2 (en) | 2018-06-19 | 2020-09-01 | Cisco Technology, Inc. | Distributed authentication and authorization for rapid scaling of containerized services |
| US10785029B2 (en) * | 2018-10-31 | 2020-09-22 | Nutanix, Inc. | Systems and methods for pairing on-premise clusters to clouds using identity service providers |
| US10805235B2 (en) | 2014-09-26 | 2020-10-13 | Cisco Technology, Inc. | Distributed application framework for prioritizing network traffic using application priority awareness |
| US10819571B2 (en) | 2018-06-29 | 2020-10-27 | Cisco Technology, Inc. | Network traffic optimization using in-situ notification system |
| US10862753B2 (en) | 2017-12-04 | 2020-12-08 | Nicira, Inc. | High availability for stateful services in public cloud logical networks |
| US10887382B2 (en) | 2018-12-18 | 2021-01-05 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US10892940B2 (en) | 2017-07-21 | 2021-01-12 | Cisco Technology, Inc. | Scalable statistics and analytics mechanisms in cloud networking |
| US10904342B2 (en) | 2018-07-30 | 2021-01-26 | Cisco Technology, Inc. | Container networking using communication tunnels |
| US10904322B2 (en) | 2018-06-15 | 2021-01-26 | Cisco Technology, Inc. | Systems and methods for scaling down cloud-based servers handling secure connections |
| WO2021043314A1 (en) * | 2019-09-06 | 2021-03-11 | 华为技术有限公司 | Communication method for hybrid cloud environment, gateway, and management method and apparatus |
| US10958720B2 (en) | 2018-12-18 | 2021-03-23 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud based disaster recovery |
| US20210092103A1 (en) * | 2018-10-02 | 2021-03-25 | Arista Networks, Inc. | In-line encryption of network data |
| US10963283B2 (en) * | 2018-12-27 | 2021-03-30 | Nutanix, Inc. | Configuration management for hybrid cloud |
| US10983886B2 (en) | 2018-12-18 | 2021-04-20 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US11005731B2 (en) | 2017-04-05 | 2021-05-11 | Cisco Technology, Inc. | Estimating model parameters for automatic deployment of scalable micro services |
| US11012507B2 (en) * | 2016-08-29 | 2021-05-18 | Vmware, Inc. | High throughput layer 2 extension leveraging CPU flow affinity |
| US11019083B2 (en) | 2018-06-20 | 2021-05-25 | Cisco Technology, Inc. | System for coordinating distributed website analysis |
| US11044162B2 (en) | 2016-12-06 | 2021-06-22 | Cisco Technology, Inc. | Orchestration of cloud and fog interactions |
| US11050586B2 (en) * | 2016-09-26 | 2021-06-29 | Huawei Technologies Co., Ltd. | Inter-cloud communication method and related device, and inter-cloud communication configuration method and related device |
| US11057350B2 (en) * | 2019-05-30 | 2021-07-06 | Cisco Technology, Inc. | Layer 2 mobility for hybrid multi-cloud deployments without host-overlay |
| US11063903B2 (en) * | 2018-04-11 | 2021-07-13 | Vmware, Inc. | Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels |
| US11093271B2 (en) | 2016-03-18 | 2021-08-17 | Airwatch Llc | Enforcing compliance rules using host management components |
| US11128490B2 (en) | 2019-04-26 | 2021-09-21 | Microsoft Technology Licensing, Llc | Enabling access to dedicated resources in a virtual network using top of rack switches |
| US11159419B1 (en) | 2021-01-29 | 2021-10-26 | Netskope, Inc. | Policy-driven data locality and residency |
| CN113595846A (en) * | 2021-07-20 | 2021-11-02 | 重庆长安汽车股份有限公司 | Method for realizing communication of GRE tunnel in cloud-to-cloud environment |
| US11178221B2 (en) | 2018-12-18 | 2021-11-16 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US11176002B2 (en) | 2018-12-18 | 2021-11-16 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US11196591B2 (en) | 2018-08-24 | 2021-12-07 | Vmware, Inc. | Centralized overlay gateway in public cloud |
| US11252019B2 (en) | 2018-12-18 | 2022-02-15 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| CN114175583A (en) * | 2019-07-29 | 2022-03-11 | 思科技术公司 | System resource management in self-healing networks |
| US11310117B2 (en) | 2020-06-24 | 2022-04-19 | Red Hat, Inc. | Pairing of a probe entity with another entity in a cloud computing environment |
| CN114500171A (en) * | 2021-12-29 | 2022-05-13 | 曙光云计算集团有限公司 | Network system and message transmission method |
| US11343229B2 (en) | 2018-06-28 | 2022-05-24 | Vmware, Inc. | Managed forwarding element detecting invalid packet addresses |
| US11349802B2 (en) * | 2017-04-04 | 2022-05-31 | Samsung Electronics Co., Ltd. | Device and method for setting transmission rules of data packet in software defined network |
| US20220174042A1 (en) * | 2018-09-21 | 2022-06-02 | Google Llc | Network Architecture for Cloud Computing Environments |
| EP3836487A4 (en) * | 2018-08-07 | 2022-06-29 | Sangfor Technologies Inc. | Internet access behavior management system, device and method |
| US20220263892A1 (en) * | 2017-08-31 | 2022-08-18 | Oracle International Corporation | System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment |
| US20220294698A1 (en) * | 2019-09-04 | 2022-09-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Edge Cloud Anchoring |
| US11481362B2 (en) | 2017-11-13 | 2022-10-25 | Cisco Technology, Inc. | Using persistent memory to enable restartability of bulk load transactions in cloud databases |
| US11489730B2 (en) | 2018-12-18 | 2022-11-01 | Storage Engine, Inc. | Methods, apparatuses and systems for configuring a network environment for a server |
| US11563601B1 (en) | 2019-08-22 | 2023-01-24 | Juniper Networks, Inc. | Proactive tunnel configuration computation for on-demand SD-WAN tunnels |
| US11595474B2 (en) | 2017-12-28 | 2023-02-28 | Cisco Technology, Inc. | Accelerating data replication using multicast and non-volatile memory enabled nodes |
| US20230117052A1 (en) * | 2021-10-19 | 2023-04-20 | Yokogawa Electric Corporation | Control system, control method, and non-transitory computer readable storage medium |
| US11695697B2 (en) | 2017-08-27 | 2023-07-04 | Nicira, Inc. | Performing in-line service in public cloud |
| US20230300612A1 (en) * | 2020-06-28 | 2023-09-21 | Zte Corporation | 5g authentication method, 5g account opening method and system, and electronic device and computer-readable storage medium |
| US11930045B1 (en) * | 2023-04-28 | 2024-03-12 | Snowflake Inc. | Secure network access from sandboxed applications |
| US12034773B2 (en) | 2021-03-23 | 2024-07-09 | Oracle International Corporation | Policy engine for governing cloud environments |
| US20240414210A1 (en) * | 2023-06-09 | 2024-12-12 | Fortinet, Inc. | Systems and methods for edge processing using selectively suspended network security |
| US20250097148A1 (en) * | 2023-09-19 | 2025-03-20 | Cisco Technology, Inc. | Service routing using ip encapsulation |
| US12335117B2 (en) * | 2016-09-28 | 2025-06-17 | Amazon Technologies, Inc. | Visualization of network health information |
| US12348634B1 (en) * | 2023-12-27 | 2025-07-01 | University Of Sharjah | Framework for storage and verification of academic credentials on blockchain technology |
| US12363035B2 (en) | 2021-09-29 | 2025-07-15 | Juniper Networks, Inc. | Opportunistic mesh for software-defined wide area network (SD-WAN) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11671430B2 (en) | 2021-05-26 | 2023-06-06 | Netskope, Inc. | Secure communication session using encryption protocols and digitally segregated secure tunnels |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110261828A1 (en) * | 2010-04-27 | 2011-10-27 | Cisco Technology, Inc. | Virtual switching overlay for cloud computing |
| US20130232491A1 (en) * | 2008-06-13 | 2013-09-05 | Netapp Inc. | Virtual machine communication |
| US20130232492A1 (en) * | 2010-10-19 | 2013-09-05 | Zte Corporation | Method and system for realizing virtual machine mobility |
| US20130268643A1 (en) * | 2012-04-05 | 2013-10-10 | Cisco Technology, Inc. | System and method for migrating application virtual machines in a network environment |
| US8909780B1 (en) * | 2012-05-24 | 2014-12-09 | Amazon Technologies, Inc. | Connection following during network reconfiguration |
| US20150063102A1 (en) * | 2013-08-30 | 2015-03-05 | Cisco Technology, Inc. | Flow Based Network Service Insertion |
| US20160188527A1 (en) * | 2014-12-29 | 2016-06-30 | Vmware, Inc. | Methods and systems to achieve multi-tenancy in rdma over converged ethernet |
| US20170054659A1 (en) * | 2015-08-20 | 2017-02-23 | Intel Corporation | Techniques for routing packets between virtual machines |
Family Cites Families (402)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5889896A (en) | 1994-02-09 | 1999-03-30 | Meshinsky; John | System for performing multiple processes on images of scanned documents |
| US5812773A (en) | 1996-07-12 | 1998-09-22 | Microsoft Corporation | System and method for the distribution of hierarchically structured data |
| US6108782A (en) | 1996-12-13 | 2000-08-22 | 3Com Corporation | Distributed remote monitoring (dRMON) for networks |
| US6091705A (en) | 1996-12-20 | 2000-07-18 | Sebring Systems, Inc. | Method and apparatus for a fault tolerant, software transparent and high data integrity extension to a backplane bus or interconnect |
| US6178453B1 (en) | 1997-02-18 | 2001-01-23 | Netspeak Corporation | Virtual circuit switching architecture |
| US6298153B1 (en) | 1998-01-16 | 2001-10-02 | Canon Kabushiki Kaisha | Digital signature method and information communication system and apparatus using such method |
| US6735631B1 (en) | 1998-02-10 | 2004-05-11 | Sprint Communications Company, L.P. | Method and system for networking redirecting |
| US20020004900A1 (en) | 1998-09-04 | 2002-01-10 | Baiju V. Patel | Method for secure anonymous communication |
| US6643260B1 (en) | 1998-12-18 | 2003-11-04 | Cisco Technology, Inc. | Method and apparatus for implementing a quality of service policy in a data communications network |
| US20040095237A1 (en) | 1999-01-09 | 2004-05-20 | Chen Kimball C. | Electronic message delivery system utilizable in the monitoring and control of remote equipment and method of same |
| ATE277378T1 (en) | 1999-10-25 | 2004-10-15 | Texas Instruments Inc | INTELLIGENT POWER CONTROL IN DISTRIBUTED PROCESSING SYSTEMS |
| US6707794B1 (en) | 1999-11-15 | 2004-03-16 | Networks Associates Technology, Inc. | Method, system and computer program product for physical link layer handshake protocol analysis |
| US6343290B1 (en) | 1999-12-22 | 2002-01-29 | Celeritas Technologies, L.L.C. | Geographic network management system |
| US6683873B1 (en) | 1999-12-27 | 2004-01-27 | Cisco Technology, Inc. | Methods and apparatus for redirecting network traffic |
| JP4162347B2 (en) | 2000-01-31 | 2008-10-08 | 富士通株式会社 | Network system |
| US7058706B1 (en) | 2000-03-31 | 2006-06-06 | Akamai Technologies, Inc. | Method and apparatus for determining latency between multiple servers and a client |
| US6721804B1 (en) | 2000-04-07 | 2004-04-13 | Danger, Inc. | Portal system for converting requested data into a bytecode format based on portal device's graphical capabilities |
| WO2001092572A1 (en) | 2000-06-01 | 2001-12-06 | Nisshinbo Industries, Inc. | Kit and method for determining hla type |
| US7917647B2 (en) | 2000-06-16 | 2011-03-29 | Mcafee, Inc. | Method and apparatus for rate limiting |
| US7062571B1 (en) | 2000-06-30 | 2006-06-13 | Cisco Technology, Inc. | Efficient IP load-balancing traffic distribution using ternary CAMs |
| US7051078B1 (en) | 2000-07-10 | 2006-05-23 | Cisco Technology, Inc. | Hierarchical associative memory-based classification system |
| AU2001288463A1 (en) | 2000-08-30 | 2002-03-13 | Citibank, N.A. | Method and system for internet hosting and security |
| US7596784B2 (en) | 2000-09-12 | 2009-09-29 | Symantec Operating Corporation | Method system and apparatus for providing pay-per-use distributed computing resources |
| US6996615B1 (en) | 2000-09-29 | 2006-02-07 | Cisco Technology, Inc. | Highly scalable least connections load balancing |
| US7054930B1 (en) | 2000-10-26 | 2006-05-30 | Cisco Technology, Inc. | System and method for propagating filters |
| US20020143928A1 (en) | 2000-12-07 | 2002-10-03 | Maltz David A. | Method and system for collection and storage of traffic data in a computer network |
| US7065482B2 (en) | 2001-05-17 | 2006-06-20 | International Business Machines Corporation | Internet traffic analysis tool |
| US7002965B1 (en) | 2001-05-21 | 2006-02-21 | Cisco Technology, Inc. | Method and apparatus for using ternary and binary content-addressable memory stages to classify packets |
| US6963913B2 (en) | 2001-06-11 | 2005-11-08 | Bluefire Security Technologies, Inc. | Packet filtering system and methods |
| US7212490B1 (en) | 2001-07-06 | 2007-05-01 | Cisco Technology, Inc. | Dynamic load balancing for dual ring topology networks |
| US7028098B2 (en) | 2001-07-20 | 2006-04-11 | Nokia, Inc. | Selective routing of data flows using a TCAM |
| JP2003345612A (en) | 2002-05-28 | 2003-12-05 | Sony Corp | Arithmetic processing system, task control method on computer system, and computer program |
| US8103755B2 (en) | 2002-07-02 | 2012-01-24 | Arbor Networks, Inc. | Apparatus and method for managing a provider network |
| US7313667B1 (en) | 2002-08-05 | 2007-12-25 | Cisco Technology, Inc. | Methods and apparatus for mapping fields of entries into new values and combining these mapped values into mapped entries for use in lookup operations such as for packet processing |
| US20040131059A1 (en) | 2002-09-19 | 2004-07-08 | Ram Ayyakad | Single-pass packet scan |
| US7076397B2 (en) | 2002-10-17 | 2006-07-11 | Bmc Software, Inc. | System and method for statistical performance monitoring |
| US7536476B1 (en) | 2002-12-20 | 2009-05-19 | Cisco Technology, Inc. | Method for performing tree based ACL lookups |
| US6733449B1 (en) | 2003-03-20 | 2004-05-11 | Siemens Medical Solutions Usa, Inc. | System and method for real-time streaming of ultrasound data to a diagnostic medical ultrasound streaming application |
| US7567504B2 (en) | 2003-06-30 | 2009-07-28 | Microsoft Corporation | Network load balancing with traffic routing |
| US20050060418A1 (en) | 2003-09-17 | 2005-03-17 | Gennady Sorokopud | Packet classification |
| US7474653B2 (en) | 2003-12-05 | 2009-01-06 | Hewlett-Packard Development Company, L.P. | Decision cache using multi-key lookup |
| US7496661B1 (en) | 2004-03-29 | 2009-02-24 | Packeteer, Inc. | Adaptive, application-aware selection of differentiated network services |
| KR20070037581A (en) | 2004-06-25 | 2007-04-05 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Anonymity Certificate with Anonymity Certificate Show |
| US7379846B1 (en) | 2004-06-29 | 2008-05-27 | Sun Microsystems, Inc. | System and method for automated problem diagnosis |
| US7684322B2 (en) | 2004-07-01 | 2010-03-23 | Nortel Networks Limited | Flow admission control in an IP network |
| US20060059558A1 (en) | 2004-09-15 | 2006-03-16 | John Selep | Proactive containment of network security attacks |
| US7881957B1 (en) | 2004-11-16 | 2011-02-01 | Amazon Technologies, Inc. | Identifying tasks for task performers based on task subscriptions |
| WO2006058065A2 (en) | 2004-11-23 | 2006-06-01 | Nighthawk Radiology Services | Methods and systems for providing data across a network |
| US7711158B2 (en) | 2004-12-04 | 2010-05-04 | Electronics And Telecommunications Research Institute | Method and apparatus for classifying fingerprint image quality, and fingerprint image recognition system using the same |
| US7548562B2 (en) | 2004-12-14 | 2009-06-16 | Agilent Technologies, Inc. | High speed acquisition system that allows capture from a packet network and streams the data to a storage medium |
| US20060146825A1 (en) | 2004-12-30 | 2006-07-06 | Padcom, Inc. | Network based quality of service |
| US7808897B1 (en) | 2005-03-01 | 2010-10-05 | International Business Machines Corporation | Fast network security utilizing intrusion prevention systems |
| WO2006112980A2 (en) | 2005-03-16 | 2006-10-26 | Cluster Resources, Inc. | Reserving resources in an on-demand compute environment from a local compute environment |
| US9015324B2 (en) | 2005-03-16 | 2015-04-21 | Adaptive Computing Enterprises, Inc. | System and method of brokering cloud computing resources |
| US20110016214A1 (en) | 2009-07-15 | 2011-01-20 | Cluster Resources, Inc. | System and method of brokering cloud computing resources |
| US7480672B2 (en) | 2005-03-31 | 2009-01-20 | Sap Ag | Multiple log queues in a database management system |
| US7606147B2 (en) | 2005-04-13 | 2009-10-20 | Zeugma Systems Inc. | Application aware traffic shaping service node positioned between the access and core networks |
| US9065727B1 (en) | 2012-08-31 | 2015-06-23 | Google Inc. | Device identifier similarity models derived from online event signals |
| US7464303B2 (en) | 2005-06-09 | 2008-12-09 | International Business Machines Corporation | Autonomically adjusting configuration parameters for a server when a different server fails |
| US7716335B2 (en) | 2005-06-27 | 2010-05-11 | Oracle America, Inc. | System and method for automated workload characterization of an application server |
| US7607043B2 (en) | 2006-01-04 | 2009-10-20 | International Business Machines Corporation | Analysis of mutually exclusive conflicts among redundant devices |
| US7613955B2 (en) | 2006-01-06 | 2009-11-03 | Microsoft Corporation | Collecting debug data from a wireless device |
| US8028071B1 (en) | 2006-02-15 | 2011-09-27 | Vmware, Inc. | TCP/IP offload engine virtualization system and methods |
| US8040895B2 (en) | 2006-03-22 | 2011-10-18 | Cisco Technology, Inc. | Method and system for removing dead access control entries (ACEs) |
| US7778183B2 (en) | 2006-03-31 | 2010-08-17 | International Business Machines Corporation | Data replica selector |
| US20090019367A1 (en) | 2006-05-12 | 2009-01-15 | Convenos, Llc | Apparatus, system, method, and computer program product for collaboration via one or more networks |
| US7761596B2 (en) | 2006-06-30 | 2010-07-20 | Telefonaktiebolaget L M Ericsson (Publ) | Router and method for server load balancing |
| US8533687B1 (en) | 2009-11-30 | 2013-09-10 | dynaTrade Software GmbH | Methods and system for global real-time transaction tracing |
| US8194664B2 (en) | 2006-10-10 | 2012-06-05 | Cisco Technology, Inc. | Two-level load-balancing of network traffic over an MPLS network |
| JP4333736B2 (en) | 2006-12-19 | 2009-09-16 | 村田機械株式会社 | Relay server and client terminal |
| US7653063B2 (en) | 2007-01-05 | 2010-01-26 | Cisco Technology, Inc. | Source address binding check |
| US8103773B2 (en) | 2007-01-19 | 2012-01-24 | Cisco Technology, Inc. | Transactional application processing in a distributed environment |
| US20080201455A1 (en) | 2007-02-15 | 2008-08-21 | Husain Syed M Amir | Moving Execution of a Virtual Machine Across Different Virtualization Platforms |
| US8406141B1 (en) | 2007-03-12 | 2013-03-26 | Cybertap, Llc | Network search methods and systems |
| US7853998B2 (en) | 2007-03-22 | 2010-12-14 | Mocana Corporation | Firewall propagation |
| US7773510B2 (en) | 2007-05-25 | 2010-08-10 | Zeugma Systems Inc. | Application routing in a distributed compute environment |
| US9678803B2 (en) | 2007-06-22 | 2017-06-13 | Red Hat, Inc. | Migration of network entities to a cloud infrastructure |
| US9495152B2 (en) | 2007-06-22 | 2016-11-15 | Red Hat, Inc. | Automatic baselining of business application service groups comprised of virtual machines |
| US8301740B2 (en) | 2007-06-27 | 2012-10-30 | Ca, Inc. | Autonomic control of a distributed computing system using dynamically assembled resource chains |
| US20090010277A1 (en) | 2007-07-03 | 2009-01-08 | Eran Halbraich | Method and system for selecting a recording route in a multi-media recording environment |
| US8205208B2 (en) | 2007-07-24 | 2012-06-19 | Internaitonal Business Machines Corporation | Scheduling grid jobs using dynamic grid scheduling policy |
| US8423470B2 (en) | 2007-09-21 | 2013-04-16 | Microsoft Corporation | Distributed secure anonymous conferencing |
| US8284664B1 (en) | 2007-09-28 | 2012-10-09 | Juniper Networks, Inc. | Redirecting data units to service modules based on service tags and a redirection table |
| US8121117B1 (en) | 2007-10-01 | 2012-02-21 | F5 Networks, Inc. | Application layer network traffic prioritization |
| US8862765B2 (en) | 2007-10-18 | 2014-10-14 | Arris Solutions, Inc. | Fair bandwidth redistribution algorithm |
| US8583797B2 (en) | 2008-01-07 | 2013-11-12 | Ca, Inc. | Interdependent capacity levels of resources in a distributed computing system |
| US20090178058A1 (en) | 2008-01-09 | 2009-07-09 | Microsoft Corporation | Application Aware Networking |
| US8291474B2 (en) | 2008-04-16 | 2012-10-16 | Oracle America, Inc. | Using opaque groups in a federated identity management environment |
| US8935692B2 (en) | 2008-05-22 | 2015-01-13 | Red Hat, Inc. | Self-management of virtual machines in cloud-based networks |
| US8943497B2 (en) | 2008-05-29 | 2015-01-27 | Red Hat, Inc. | Managing subscriptions for cloud-based virtual machines |
| US8171415B2 (en) | 2008-06-11 | 2012-05-01 | International Business Machines Corporation | Outage management portal leveraging back-end resources to create a role and user tailored front-end interface for coordinating outage responses |
| US9069599B2 (en) | 2008-06-19 | 2015-06-30 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
| US8514868B2 (en) | 2008-06-19 | 2013-08-20 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
| US8175103B2 (en) | 2008-06-26 | 2012-05-08 | Rockstar Bidco, LP | Dynamic networking of virtual machines |
| US8479192B2 (en) | 2008-06-27 | 2013-07-02 | Xerox Corporation | Dynamic XPS filter |
| US8250215B2 (en) | 2008-08-12 | 2012-08-21 | Sap Ag | Method and system for intelligently leveraging cloud computing resources |
| US8706878B1 (en) | 2008-08-21 | 2014-04-22 | United Services Automobile Association | Preferential loading in data centers |
| WO2010062435A1 (en) | 2008-09-04 | 2010-06-03 | Telcordia Technologies, Inc. | Computing diagnostic explanations of network faults from monitoring data |
| US8238256B2 (en) | 2008-09-08 | 2012-08-07 | Nugent Raymond M | System and method for cloud computing |
| US8041714B2 (en) | 2008-09-15 | 2011-10-18 | Palantir Technologies, Inc. | Filter chains with associated views for exploring large data sets |
| CN101394360B (en) | 2008-11-10 | 2011-07-20 | 北京星网锐捷网络技术有限公司 | Processing method, access device and communication system for address resolution protocol |
| US9621341B2 (en) | 2008-11-26 | 2017-04-11 | Microsoft Technology Licensing, Llc | Anonymous verifiable public key certificates |
| EP2211502A1 (en) | 2009-01-22 | 2010-07-28 | IBBT vzw | Management system and method for configuring a network for transferring media data |
| US8566362B2 (en) | 2009-01-23 | 2013-10-22 | Nasuni Corporation | Method and system for versioned file system using structured data representations |
| US20120005724A1 (en) | 2009-02-09 | 2012-01-05 | Imera Systems, Inc. | Method and system for protecting private enterprise resources in a cloud computing environment |
| US8510735B2 (en) | 2009-02-11 | 2013-08-13 | International Business Machines Corporation | Runtime environment for virtualizing information technology appliances |
| US8341427B2 (en) | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
| US8432919B2 (en) | 2009-02-25 | 2013-04-30 | Cisco Technology, Inc. | Data stream classification |
| US9473555B2 (en) | 2012-12-31 | 2016-10-18 | The Nielsen Company (Us), Llc | Apparatus, system and methods for portable device tracking using temporary privileged access |
| EP2228719A1 (en) | 2009-03-11 | 2010-09-15 | Zimory GmbH | Method of executing a virtual machine, computing system and computer program |
| US8271615B2 (en) | 2009-03-31 | 2012-09-18 | Cloud Connex, Llc | Centrally managing and monitoring software as a service (SaaS) applications |
| US8560639B2 (en) | 2009-04-24 | 2013-10-15 | Microsoft Corporation | Dynamic placement of replica data |
| US8516106B2 (en) | 2009-05-18 | 2013-08-20 | International Business Machines Corporation | Use tag clouds to visualize components related to an event |
| TW201112006A (en) | 2009-05-29 | 2011-04-01 | Ibm | Computer system, method and program product |
| US8639787B2 (en) | 2009-06-01 | 2014-01-28 | Oracle International Corporation | System and method for creating or reconfiguring a virtual server image for cloud deployment |
| JP5400482B2 (en) | 2009-06-04 | 2014-01-29 | 株式会社日立製作所 | Management computer, resource management method, resource management program, recording medium, and information processing system |
| US8284776B2 (en) | 2009-06-10 | 2012-10-09 | Broadcom Corporation | Recursive packet header processing |
| US20100318609A1 (en) | 2009-06-15 | 2010-12-16 | Microsoft Corporation | Bridging enterprise networks into cloud |
| EP2267983B1 (en) | 2009-06-22 | 2018-08-08 | Citrix Systems, Inc. | System and method for providing link management in a multi-core system |
| KR101626117B1 (en) | 2009-06-22 | 2016-05-31 | 삼성전자주식회사 | Client, brokerage sever and method for providing cloud storage |
| US8281149B2 (en) | 2009-06-23 | 2012-10-02 | Google Inc. | Privacy-preserving flexible anonymous-pseudonymous access |
| US8244559B2 (en) | 2009-06-26 | 2012-08-14 | Microsoft Corporation | Cloud computing resource broker |
| US8849955B2 (en) | 2009-06-30 | 2014-09-30 | Commvault Systems, Inc. | Cloud storage and networking agents, including agents for utilizing multiple, different cloud storage sites |
| US8234377B2 (en) | 2009-07-22 | 2012-07-31 | Amazon Technologies, Inc. | Dynamically migrating computer networks |
| US8966475B2 (en) | 2009-08-10 | 2015-02-24 | Novell, Inc. | Workload management for heterogeneous hosts in a computing system environment |
| US8862720B2 (en) | 2009-08-31 | 2014-10-14 | Red Hat, Inc. | Flexible cloud management including external clouds |
| US8510469B2 (en) | 2009-08-31 | 2013-08-13 | Cisco Technology, Inc. | Measuring attributes of client-server applications |
| US8271653B2 (en) | 2009-08-31 | 2012-09-18 | Red Hat, Inc. | Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled clouds |
| US20110072489A1 (en) | 2009-09-23 | 2011-03-24 | Gilad Parann-Nissany | Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management |
| US8532108B2 (en) | 2009-09-30 | 2013-09-10 | Alcatel Lucent | Layer 2 seamless site extension of enterprises in cloud computing |
| JP2011076292A (en) | 2009-09-30 | 2011-04-14 | Hitachi Ltd | Method for designing failure cause analysis rule in accordance with available device information, and computer |
| US8880682B2 (en) | 2009-10-06 | 2014-11-04 | Emc Corporation | Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations |
| US20110110382A1 (en) | 2009-11-10 | 2011-05-12 | Cisco Technology, Inc., A Corporation Of California | Distribution of Packets Among PortChannel Groups of PortChannel Links |
| US8611356B2 (en) | 2009-11-13 | 2013-12-17 | Exalt Communications Incorporated | Apparatus for ethernet traffic aggregation of radio links |
| US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
| CN101719930A (en) | 2009-11-27 | 2010-06-02 | 南京邮电大学 | Cloud money-based hierarchical cloud computing system excitation method |
| GB2475897A (en) | 2009-12-04 | 2011-06-08 | Creme Software Ltd | Resource allocation using estimated time to complete jobs in a grid or cloud computing environment |
| US8037187B2 (en) | 2009-12-11 | 2011-10-11 | International Business Machines Corporation | Resource exchange management within a cloud computing environment |
| US20130117337A1 (en) | 2009-12-23 | 2013-05-09 | Gary M. Dunham | Locally Connected Cloud Storage Device |
| US9959147B2 (en) | 2010-01-13 | 2018-05-01 | Vmware, Inc. | Cluster configuration through host ranking |
| US9883008B2 (en) | 2010-01-15 | 2018-01-30 | Endurance International Group, Inc. | Virtualization of multiple distinct website hosting architectures |
| WO2011091056A1 (en) | 2010-01-19 | 2011-07-28 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer |
| US8301746B2 (en) | 2010-01-26 | 2012-10-30 | International Business Machines Corporation | Method and system for abstracting non-functional requirements based deployment of virtual machines |
| US8797866B2 (en) | 2010-02-12 | 2014-08-05 | Cisco Technology, Inc. | Automatic adjusting of reputation thresholds in order to change the processing of certain packets |
| US8898457B2 (en) | 2010-02-26 | 2014-11-25 | Red Hat, Inc. | Automatically generating a certificate operation request |
| US20110213687A1 (en) | 2010-02-26 | 2011-09-01 | James Michael Ferris | Systems and methods for or a usage manager for cross-cloud appliances |
| US9129086B2 (en) | 2010-03-04 | 2015-09-08 | International Business Machines Corporation | Providing security services within a cloud computing environment |
| US20110239039A1 (en) | 2010-03-26 | 2011-09-29 | Dieffenbach Devon C | Cloud computing enabled robust initialization and recovery of it services |
| US20110252327A1 (en) | 2010-03-26 | 2011-10-13 | Actiance, Inc. | Methods, systems, and user interfaces for graphical summaries of network activities |
| US8886806B2 (en) | 2010-04-07 | 2014-11-11 | Accenture Global Services Limited | Generic control layer in a cloud environment |
| US8243598B2 (en) | 2010-04-26 | 2012-08-14 | International Business Machines Corporation | Load-balancing via modulus distribution and TCP flow redirection due to server overload |
| US8547974B1 (en) | 2010-05-05 | 2013-10-01 | Mu Dynamics | Generating communication protocol test cases based on network traffic |
| US8719804B2 (en) | 2010-05-05 | 2014-05-06 | Microsoft Corporation | Managing runtime execution of applications on cloud computing systems |
| US9223617B2 (en) | 2010-05-06 | 2015-12-29 | Nec Laboratories America, Inc. | Methods and systems for migrating networked systems across administrative domains |
| US8910278B2 (en) | 2010-05-18 | 2014-12-09 | Cloudnexa | Managing services in a cloud computing environment |
| CN102255933B (en) | 2010-05-20 | 2016-03-30 | 中兴通讯股份有限公司 | Cloud service intermediary, cloud computing method and cloud system |
| US8954564B2 (en) | 2010-05-28 | 2015-02-10 | Red Hat, Inc. | Cross-cloud vendor mapping service in cloud marketplace |
| US8477610B2 (en) | 2010-05-31 | 2013-07-02 | Microsoft Corporation | Applying policies to schedule network bandwidth among virtual machines |
| EP2577539B1 (en) | 2010-06-02 | 2018-12-19 | VMware, Inc. | Securing customer virtual machines in a multi-tenant cloud |
| US8352415B2 (en) | 2010-06-15 | 2013-01-08 | International Business Machines Corporation | Converting images in virtual environments |
| US8705395B2 (en) | 2010-06-15 | 2014-04-22 | Jds Uniphase Corporation | Method for time aware inline remote mirroring |
| US8135979B2 (en) | 2010-06-24 | 2012-03-13 | Hewlett-Packard Development Company, L.P. | Collecting network-level packets into a data structure in response to an abnormal condition |
| US9201701B2 (en) | 2010-07-16 | 2015-12-01 | Nokia Technologies Oy | Method and apparatus for distributing computation closures |
| US8843832B2 (en) | 2010-07-23 | 2014-09-23 | Reh Hat, Inc. | Architecture, system and method for a real-time collaboration interface |
| TWM394537U (en) | 2010-08-17 | 2010-12-11 | Chunghwa Telecom Co Ltd | A system for providing web cloud integrated services |
| US8473557B2 (en) | 2010-08-24 | 2013-06-25 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
| US8656023B1 (en) | 2010-08-26 | 2014-02-18 | Adobe Systems Incorporated | Optimization scheduler for deploying applications on a cloud |
| US9311158B2 (en) | 2010-09-03 | 2016-04-12 | Adobe Systems Incorporated | Determining a work distribution model between a client device and a cloud for an application deployed on the cloud |
| US8539597B2 (en) | 2010-09-16 | 2013-09-17 | International Business Machines Corporation | Securing sensitive data for cloud computing |
| US8572241B2 (en) | 2010-09-17 | 2013-10-29 | Microsoft Corporation | Integrating external and cluster heat map data |
| US8413145B2 (en) | 2010-09-30 | 2013-04-02 | Avaya Inc. | Method and apparatus for efficient memory replication for high availability (HA) protection of a virtual machine (VM) |
| US9128626B2 (en) | 2010-10-01 | 2015-09-08 | Peter Chacko | Distributed virtual storage cloud architecture and a method thereof |
| US20120084445A1 (en) | 2010-10-05 | 2012-04-05 | Brock Scott L | Automatic replication and migration of live virtual machines |
| EP2439637A1 (en) | 2010-10-07 | 2012-04-11 | Deutsche Telekom AG | Method and system of providing access to a virtual machine distributed in a hybrid cloud network |
| US8797867B1 (en) | 2010-10-18 | 2014-08-05 | Juniper Networks, Inc. | Generating and enforcing a holistic quality of service policy in a network |
| US8909744B2 (en) | 2010-10-20 | 2014-12-09 | Hcl Technologies Limited | System and method for transitioning to cloud computing environment |
| US9075661B2 (en) | 2010-10-20 | 2015-07-07 | Microsoft Technology Licensing, Llc | Placing objects on hosts using hard and soft constraints |
| US8407413B1 (en) | 2010-11-05 | 2013-03-26 | Netapp, Inc | Hardware flow classification for data storage services |
| US8612615B2 (en) | 2010-11-23 | 2013-12-17 | Red Hat, Inc. | Systems and methods for identifying usage histories for producing optimized cloud utilization |
| JP5725812B2 (en) | 2010-11-25 | 2015-05-27 | キヤノン株式会社 | Document processing apparatus, document processing method, and program |
| US8560792B2 (en) | 2010-12-16 | 2013-10-15 | International Business Machines Corporation | Synchronous extent migration protocol for paired storage |
| US10176018B2 (en) | 2010-12-21 | 2019-01-08 | Intel Corporation | Virtual core abstraction for cloud computing |
| US8832111B2 (en) | 2010-12-30 | 2014-09-09 | Facebook, Inc. | Distributed cache for graph data |
| US8935383B2 (en) | 2010-12-31 | 2015-01-13 | Verisign, Inc. | Systems, apparatus, and methods for network data analysis |
| US8495356B2 (en) | 2010-12-31 | 2013-07-23 | International Business Machines Corporation | System for securing virtual machine disks on a remote shared storage subsystem |
| US20120179909A1 (en) | 2011-01-06 | 2012-07-12 | Pitney Bowes Inc. | Systems and methods for providing individual electronic document secure storage, retrieval and use |
| US8448171B2 (en) | 2011-01-07 | 2013-05-21 | International Business Machines Corporation | Communications between virtual machines that have been migrated |
| US8495252B2 (en) | 2011-01-17 | 2013-07-23 | International Business Machines Corporation | Implementing PCI-express memory domains for single root virtualized devices |
| US20120182891A1 (en) | 2011-01-19 | 2012-07-19 | Youngseok Lee | Packet analysis system and method using hadoop based parallel computation |
| US9225554B2 (en) | 2011-01-26 | 2015-12-29 | Cisco Technology, Inc. | Device-health-based dynamic configuration of network management systems suited for network operations |
| US8619568B2 (en) | 2011-02-04 | 2013-12-31 | Cisco Technology, Inc. | Reassignment of distributed packet flows |
| US9009697B2 (en) | 2011-02-08 | 2015-04-14 | International Business Machines Corporation | Hybrid cloud integrator |
| US8805951B1 (en) | 2011-02-08 | 2014-08-12 | Emc Corporation | Virtual machines and cloud storage caching for cloud computing applications |
| US9063789B2 (en) | 2011-02-08 | 2015-06-23 | International Business Machines Corporation | Hybrid cloud integrator plug-in components |
| US20120204187A1 (en) | 2011-02-08 | 2012-08-09 | International Business Machines Corporation | Hybrid Cloud Workload Management |
| WO2012115970A2 (en) | 2011-02-22 | 2012-08-30 | Fedex Corporate Services, Inc. | Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture |
| US9053580B2 (en) | 2011-02-25 | 2015-06-09 | International Business Machines Corporation | Data processing environment integration control interface |
| US8832818B2 (en) | 2011-02-28 | 2014-09-09 | Rackspace Us, Inc. | Automated hybrid connections between multiple environments in a data center |
| US20120236716A1 (en) | 2011-03-14 | 2012-09-20 | Atheros Communications, Inc. | Profile-based quality of service for wireless communication systems |
| KR101544482B1 (en) | 2011-03-15 | 2015-08-21 | 주식회사 케이티 | Cloud center controlling apparatus and cloud center selecting method of the same |
| US20140019639A1 (en) | 2011-03-31 | 2014-01-16 | Hiroshi Ueno | Computer system and communication method |
| US9100188B2 (en) | 2011-04-18 | 2015-08-04 | Bank Of America Corporation | Hardware-based root of trust for cloud environments |
| KR101544485B1 (en) | 2011-04-25 | 2015-08-17 | 주식회사 케이티 | Method and apparatus for selecting a node to place a replica in cloud storage system |
| US8869244B1 (en) | 2011-05-03 | 2014-10-21 | Symantec Corporation | Techniques for providing role-based access control using dynamic shared accounts |
| US8806015B2 (en) | 2011-05-04 | 2014-08-12 | International Business Machines Corporation | Workload-aware placement in private heterogeneous clouds |
| US9253252B2 (en) | 2011-05-06 | 2016-02-02 | Citrix Systems, Inc. | Systems and methods for cloud bridging between intranet resources and cloud resources |
| CN103650426B (en) | 2011-05-06 | 2016-10-05 | 思杰系统有限公司 | System and method for cloud bridging between public cloud and private cloud |
| US8977754B2 (en) | 2011-05-09 | 2015-03-10 | Metacloud Inc. | Composite public cloud, method and system |
| US8590050B2 (en) | 2011-05-11 | 2013-11-19 | International Business Machines Corporation | Security compliant data storage management |
| CN102164091B (en) | 2011-05-13 | 2015-01-21 | 北京星网锐捷网络技术有限公司 | Method for building MAC (Media Access Control) address table and provider edge device |
| US8719627B2 (en) | 2011-05-20 | 2014-05-06 | Microsoft Corporation | Cross-cloud computing for capacity management and disaster recovery |
| US8984104B2 (en) | 2011-05-31 | 2015-03-17 | Red Hat, Inc. | Self-moving operating system installation in cloud-based network |
| US9244751B2 (en) | 2011-05-31 | 2016-01-26 | Hewlett Packard Enterprise Development Lp | Estimating a performance parameter of a job having map and reduce tasks after a failure |
| US9104460B2 (en) | 2011-05-31 | 2015-08-11 | Red Hat, Inc. | Inter-cloud live migration of virtualization systems |
| US8959526B2 (en) | 2011-06-09 | 2015-02-17 | Microsoft Corporation | Scheduling execution of complementary jobs based on resource usage |
| US8806003B2 (en) | 2011-06-14 | 2014-08-12 | International Business Machines Corporation | Forecasting capacity available for processing workloads in a networked computing environment |
| US8547975B2 (en) | 2011-06-28 | 2013-10-01 | Verisign, Inc. | Parallel processing for multiple instance real-time monitoring |
| US8589543B2 (en) | 2011-07-01 | 2013-11-19 | Cisco Technology, Inc. | Virtual data center monitoring |
| US8959003B2 (en) | 2011-07-07 | 2015-02-17 | International Business Machines Corporation | Interactive data visualization for trend analysis |
| US20130036213A1 (en) | 2011-08-02 | 2013-02-07 | Masum Hasan | Virtual private clouds |
| CN107071088B (en) | 2011-08-17 | 2020-06-05 | Nicira股份有限公司 | Logical L3 routing |
| WO2013028211A1 (en) | 2011-08-19 | 2013-02-28 | Hewlett-Packard Development Company, L.P. | Providing a simulation service by a cloud-based infrastructure |
| US8630291B2 (en) | 2011-08-22 | 2014-01-14 | Cisco Technology, Inc. | Dynamic multi-path forwarding for shared-media communication networks |
| US9021077B2 (en) | 2011-09-26 | 2015-04-28 | Hitachi, Ltd. | Management computer and method for root cause analysis |
| WO2013048986A1 (en) | 2011-09-26 | 2013-04-04 | Knoa Software, Inc. | Method, system and program product for allocation and/or prioritization of electronic resources |
| CN103023762A (en) | 2011-09-27 | 2013-04-03 | 阿尔卡特朗讯公司 | Cloud computing access gateway and method for providing access to cloud provider for user terminal |
| US9250941B2 (en) | 2011-09-30 | 2016-02-02 | Telefonaktiebolaget L M Ericsson (Publ) | Apparatus and method for segregating tenant specific data when using MPLS in openflow-enabled cloud computing |
| US8560663B2 (en) | 2011-09-30 | 2013-10-15 | Telefonaktiebolaget L M Ericsson (Publ) | Using MPLS for virtual private cloud network isolation in openflow-enabled cloud computing |
| US20130091557A1 (en) | 2011-10-11 | 2013-04-11 | Wheel Innovationz, Inc. | System and method for providing cloud-based cross-platform application stores for mobile computing devices |
| DE102012217202B4 (en) | 2011-10-12 | 2020-06-18 | International Business Machines Corporation | Method and system for optimizing the placement of virtual machines in cloud computing environments |
| US9201690B2 (en) | 2011-10-21 | 2015-12-01 | International Business Machines Corporation | Resource aware scheduling in a distributed computing environment |
| US8789179B2 (en) | 2011-10-28 | 2014-07-22 | Novell, Inc. | Cloud protection techniques |
| US9311160B2 (en) | 2011-11-10 | 2016-04-12 | Verizon Patent And Licensing Inc. | Elastic cloud networking |
| US8832249B2 (en) | 2011-11-30 | 2014-09-09 | At&T Intellectual Property I, L.P. | Methods and apparatus to adjust resource allocation in a distributive computing network |
| US9916184B2 (en) | 2011-12-02 | 2018-03-13 | International Business Machines Corporation | Data relocation in global storage cloud environments |
| US20130152076A1 (en) | 2011-12-07 | 2013-06-13 | Cisco Technology, Inc. | Network Access Control Policy for Virtual Machine Migration |
| US9113376B2 (en) | 2011-12-09 | 2015-08-18 | Cisco Technology, Inc. | Multi-interface mobility |
| US8694995B2 (en) | 2011-12-14 | 2014-04-08 | International Business Machines Corporation | Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment |
| US8832262B2 (en) | 2011-12-15 | 2014-09-09 | Cisco Technology, Inc. | Normalizing network performance indexes |
| US10134056B2 (en) | 2011-12-16 | 2018-11-20 | Ebay Inc. | Systems and methods for providing information based on location |
| US8860777B2 (en) | 2011-12-22 | 2014-10-14 | Verizon Patent And Licensing Inc. | Multi-enterprise video conference service |
| US8547379B2 (en) | 2011-12-29 | 2013-10-01 | Joyent, Inc. | Systems, methods, and media for generating multidimensional heat maps |
| US8555339B2 (en) | 2012-01-06 | 2013-10-08 | International Business Machines Corporation | Identifying guests in web meetings |
| US8732291B2 (en) | 2012-01-13 | 2014-05-20 | Accenture Global Services Limited | Performance interference model for managing consolidated workloads in QOS-aware clouds |
| US8908698B2 (en) | 2012-01-13 | 2014-12-09 | Cisco Technology, Inc. | System and method for managing site-to-site VPNs of a cloud managed network |
| US9336061B2 (en) | 2012-01-14 | 2016-05-10 | International Business Machines Corporation | Integrated metering of service usage for hybrid clouds |
| US9529348B2 (en) | 2012-01-24 | 2016-12-27 | Emerson Process Management Power & Water Solutions, Inc. | Method and apparatus for deploying industrial plant simulators using cloud computing technologies |
| US9049589B2 (en) | 2012-01-27 | 2015-06-02 | Microsoft Technology Licensing, Llc | Dynamically adjusting a data usage plan based on data usage statistics |
| US9967159B2 (en) | 2012-01-31 | 2018-05-08 | Infosys Limited | Systems and methods for providing decision time brokerage in a hybrid cloud ecosystem |
| US8660129B1 (en) | 2012-02-02 | 2014-02-25 | Cisco Technology, Inc. | Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks |
| US9451303B2 (en) | 2012-02-27 | 2016-09-20 | The Nielsen Company (Us), Llc | Method and system for gathering and computing an audience's neurologically-based reactions in a distributed framework involving remote storage and computing |
| US10097406B2 (en) | 2012-03-19 | 2018-10-09 | Level 3 Communications, Llc | Systems and methods for data mobility with a cloud architecture |
| US9350671B2 (en) | 2012-03-22 | 2016-05-24 | Futurewei Technologies, Inc. | Supporting software defined networking with application layer traffic optimization |
| US20130254415A1 (en) | 2012-03-26 | 2013-09-26 | F. Brian Fullen | Routing requests over a network |
| EP2645257A3 (en) | 2012-03-29 | 2014-06-18 | Prelert Ltd. | System and method for visualisation of behaviour within computer infrastructure |
| FR2988943A1 (en) | 2012-03-29 | 2013-10-04 | France Telecom | SYSTEM FOR SUPERVISING THE SAFETY OF AN ARCHITECTURE |
| US9164795B1 (en) | 2012-03-30 | 2015-10-20 | Amazon Technologies, Inc. | Secure tunnel infrastructure between hosts in a hybrid network environment |
| US8930747B2 (en) | 2012-03-30 | 2015-01-06 | Sungard Availability Services, Lp | Private cloud replication and recovery |
| US9313048B2 (en) | 2012-04-04 | 2016-04-12 | Cisco Technology, Inc. | Location aware virtual service provisioning in a hybrid cloud environment |
| US8856339B2 (en) | 2012-04-04 | 2014-10-07 | Cisco Technology, Inc. | Automatically scaled network overlay with heuristic monitoring in a hybrid cloud environment |
| US8775576B2 (en) | 2012-04-17 | 2014-07-08 | Nimbix, Inc. | Reconfigurable cloud computing |
| US9203784B2 (en) | 2012-04-24 | 2015-12-01 | Cisco Technology, Inc. | Distributed virtual switch architecture for a hybrid cloud |
| US8918510B2 (en) | 2012-04-27 | 2014-12-23 | Hewlett-Packard Development Company, L. P. | Evaluation of cloud computing services |
| US9223634B2 (en) | 2012-05-02 | 2015-12-29 | Cisco Technology, Inc. | System and method for simulating virtual machine migration in a network environment |
| WO2013186870A1 (en) | 2012-06-13 | 2013-12-19 | 株式会社日立製作所 | Service monitoring system and service monitoring method |
| US9183031B2 (en) | 2012-06-19 | 2015-11-10 | Bank Of America Corporation | Provisioning of a virtual machine by using a secured zone of a cloud environment |
| US8938775B1 (en) | 2012-06-27 | 2015-01-20 | Amazon Technologies, Inc. | Dynamic data loss prevention in a multi-tenant environment |
| US9215131B2 (en) | 2012-06-29 | 2015-12-15 | Cisco Technology, Inc. | Methods for exchanging network management messages using UDP over HTTP protocol |
| US20140006585A1 (en) | 2012-06-29 | 2014-01-02 | Futurewei Technologies, Inc. | Providing Mobility in Overlay Networks |
| US8909857B2 (en) | 2012-06-29 | 2014-12-09 | Broadcom Corporation | Efficient storage of ACL frequent ranges in a ternary memory |
| US9167050B2 (en) | 2012-08-16 | 2015-10-20 | Futurewei Technologies, Inc. | Control pool based enterprise policy enabler for controlled cloud access |
| US20140052877A1 (en) | 2012-08-16 | 2014-02-20 | Wenbo Mao | Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters |
| US9582221B2 (en) | 2012-08-24 | 2017-02-28 | Vmware, Inc. | Virtualization-aware data locality in distributed data processing |
| US10097378B2 (en) | 2012-09-07 | 2018-10-09 | Cisco Technology, Inc. | Efficient TCAM resource sharing |
| US9069979B2 (en) | 2012-09-07 | 2015-06-30 | Oracle International Corporation | LDAP-based multi-tenant in-cloud identity management system |
| US9047181B2 (en) | 2012-09-07 | 2015-06-02 | Splunk Inc. | Visualization of data from clusters |
| US9634922B2 (en) | 2012-09-11 | 2017-04-25 | Board Of Regents Of The Nevada System Of Higher Education, On Behalf Of The University Of Nevada, Reno | Apparatus, system, and method for cloud-assisted routing |
| US9383900B2 (en) | 2012-09-12 | 2016-07-05 | International Business Machines Corporation | Enabling real-time operational environment conformity to an enterprise model |
| US8924720B2 (en) | 2012-09-27 | 2014-12-30 | Intel Corporation | Method and system to securely migrate and provision virtual machine images and content |
| US8850182B1 (en) | 2012-09-28 | 2014-09-30 | Shoretel, Inc. | Data capture for secure protocols |
| US9301205B2 (en) | 2012-10-04 | 2016-03-29 | Benu Networks, Inc. | Application and content awareness for self optimizing networks |
| US9369371B2 (en) | 2012-10-05 | 2016-06-14 | Cisco Technologies, Inc. | Method and system for path monitoring using segment routing |
| US9792004B2 (en) | 2012-10-08 | 2017-10-17 | Fisher-Rosemount Systems, Inc. | Derived and linked definitions with override |
| US9251114B1 (en) | 2012-10-12 | 2016-02-02 | Egnyte, Inc. | Systems and methods for facilitating access to private files using a cloud storage system |
| US9361192B2 (en) | 2012-10-19 | 2016-06-07 | Oracle International Corporation | Method and apparatus for restoring an instance of a storage server |
| US9264478B2 (en) | 2012-10-30 | 2016-02-16 | Microsoft Technology Licensing, Llc | Home cloud with virtualized input and output roaming over network |
| US9424228B2 (en) | 2012-11-01 | 2016-08-23 | Ezchip Technologies Ltd. | High performance, scalable multi chip interconnect |
| US9442954B2 (en) | 2012-11-12 | 2016-09-13 | Datawise Systems | Method and apparatus for achieving optimal resource allocation dynamically in a distributed computing environment |
| US20140140211A1 (en) | 2012-11-16 | 2014-05-22 | Cisco Technology, Inc. | Classification of traffic for application aware policies in a wireless network |
| US9398436B2 (en) | 2012-11-21 | 2016-07-19 | Acer Incorporated | Cloud service for making social connections |
| US9338101B2 (en) | 2012-12-06 | 2016-05-10 | At&T Intellectual Property I, L.P. | Advertising network layer reachability information specifying a quality of service for an identified network flow |
| US9049115B2 (en) | 2012-12-13 | 2015-06-02 | Cisco Technology, Inc. | Enabling virtual workloads using overlay technologies to interoperate with physical network services |
| US20150070516A1 (en) | 2012-12-14 | 2015-03-12 | Biscotti Inc. | Automatic Content Filtering |
| US9268808B2 (en) | 2012-12-31 | 2016-02-23 | Facebook, Inc. | Placement policy |
| US9122510B2 (en) | 2013-01-02 | 2015-09-01 | International Business Machines Corporation | Querying and managing computing resources in a networked computing environment |
| CN105144652A (en) | 2013-01-24 | 2015-12-09 | 惠普发展公司,有限责任合伙企业 | Address resolution in software-defined networks |
| US20140215471A1 (en) | 2013-01-28 | 2014-07-31 | Hewlett-Packard Development Company, L.P. | Creating a model relating to execution of a job on platforms |
| US9274818B2 (en) | 2013-02-06 | 2016-03-01 | International Business Machines Corporation | Reliable and scalable image transfer for data centers with low connectivity using redundancy detection |
| US9525564B2 (en) | 2013-02-26 | 2016-12-20 | Zentera Systems, Inc. | Secure virtual network platform for enterprise hybrid cloud computing environments |
| US9183016B2 (en) | 2013-02-27 | 2015-11-10 | Vmware, Inc. | Adaptive task scheduling of Hadoop in a virtualized environment |
| US9251115B2 (en) | 2013-03-07 | 2016-02-02 | Citrix Systems, Inc. | Dynamic configuration in cloud computing environments |
| US9027087B2 (en) | 2013-03-14 | 2015-05-05 | Rackspace Us, Inc. | Method and system for identity-based authentication of virtual machines |
| US9244775B2 (en) | 2013-03-14 | 2016-01-26 | International Business Machines Corporation | Reducing reading of database logs by persisting long-running transaction data |
| US9043439B2 (en) | 2013-03-14 | 2015-05-26 | Cisco Technology, Inc. | Method for streaming packet captures from network access devices to a cloud server over HTTP |
| US20140280805A1 (en) | 2013-03-14 | 2014-09-18 | Rackspace Us, Inc. | Two-Sided Declarative Configuration for Cloud Deployment |
| US20140282669A1 (en) | 2013-03-15 | 2014-09-18 | F. Gavin McMillan | Methods and apparatus to identify companion media interaction |
| US20140280964A1 (en) | 2013-03-15 | 2014-09-18 | Gravitant, Inc. | Systems, methods and computer readable mediums for implementing cloud service brokerage platform functionalities |
| US9716634B2 (en) | 2013-03-15 | 2017-07-25 | International Business Machines Corporation | Fulfillment of cloud service orders |
| US8954992B2 (en) | 2013-03-15 | 2015-02-10 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Distributed and scaled-out network switch and packet processing |
| JP5983484B2 (en) | 2013-03-21 | 2016-08-31 | 富士通株式会社 | Information processing system, control program for controlling information processing apparatus, and control method for information processing system |
| US9613322B2 (en) | 2013-04-02 | 2017-04-04 | Orbis Technologies, Inc. | Data center analytics and dashboard |
| US9438495B2 (en) | 2013-04-02 | 2016-09-06 | Amazon Technologies, Inc. | Visualization of resources in a data center |
| US9973375B2 (en) | 2013-04-22 | 2018-05-15 | Cisco Technology, Inc. | App store portal providing point-and-click deployment of third-party virtualized network functions |
| US9397929B2 (en) | 2013-04-22 | 2016-07-19 | Ciena Corporation | Forwarding multicast packets over different layer-2 segments |
| US9407540B2 (en) | 2013-09-06 | 2016-08-02 | Cisco Technology, Inc. | Distributed service chaining in a network environment |
| WO2014177190A1 (en) | 2013-04-30 | 2014-11-06 | Telefonaktiebolaget L M Ericsson (Publ) | Technique of operating a network node for load balancing |
| US20140366155A1 (en) | 2013-06-11 | 2014-12-11 | Cisco Technology, Inc. | Method and system of providing storage services in multiple public clouds |
| US9621642B2 (en) | 2013-06-17 | 2017-04-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods of forwarding data packets using transient tables and related load balancers |
| US9535970B2 (en) | 2013-06-28 | 2017-01-03 | Sap Se | Metric catalog system |
| US9558056B2 (en) | 2013-07-28 | 2017-01-31 | OpsClarity Inc. | Organizing network performance metrics into historical anomaly dependency data |
| US9426060B2 (en) | 2013-08-07 | 2016-08-23 | International Business Machines Corporation | Software defined network (SDN) switch clusters having layer-3 distributed router functionality |
| US9401860B2 (en) | 2013-08-09 | 2016-07-26 | Citrix Systems, Inc. | High performance quality-of-service packet scheduling for multiple packet processing engines |
| US9311140B2 (en) | 2013-08-13 | 2016-04-12 | Vmware, Inc. | Method and apparatus for extending local area networks between clouds and migrating virtual machines using static network addresses |
| US9338223B2 (en) | 2013-08-14 | 2016-05-10 | Verizon Patent And Licensing Inc. | Private cloud topology management system |
| US9104334B2 (en) | 2013-08-20 | 2015-08-11 | Avago Technologies General Ip (Singapore) Pte. Ltd | Performance improvements in input/output operations between a host system and an adapter-coupled cache |
| US9043576B2 (en) | 2013-08-21 | 2015-05-26 | Simplivity Corporation | System and method for virtual machine conversion |
| US9686154B2 (en) | 2013-08-21 | 2017-06-20 | International Business Machines Corporation | Generating a service-catalog entry from discovered attributes of provisioned virtual machines |
| US10402194B2 (en) | 2013-09-20 | 2019-09-03 | Infosys Limited | Systems and methods for extracting cross language dependencies and estimating code change impact in software |
| US9304804B2 (en) | 2013-10-14 | 2016-04-05 | Vmware, Inc. | Replicating virtual machines across different virtualization platforms |
| US20150106805A1 (en) | 2013-10-15 | 2015-04-16 | Cisco Technology, Inc. | Accelerated instantiation of cloud resource |
| US9264362B2 (en) | 2013-10-17 | 2016-02-16 | Cisco Technology, Inc. | Proxy address resolution protocol on a controller device |
| US9634944B2 (en) | 2013-10-24 | 2017-04-25 | Dell Products, Lp | Multi-level iSCSI QoS for target differentiated data in DCB networks |
| US9787586B2 (en) | 2013-10-24 | 2017-10-10 | University Of Houston System | Location-based network routing |
| US10146607B2 (en) | 2013-11-26 | 2018-12-04 | Anunta Technology Management Services Ltd. | Troubleshooting of cloud-based application delivery |
| KR20150070676A (en) | 2013-12-17 | 2015-06-25 | 소프팅스 주식회사 | Personal Home Cloud Computer System |
| US10915449B2 (en) | 2013-12-19 | 2021-02-09 | Hewlett Packard Enterprise Development Lp | Prioritizing data requests based on quality of service |
| WO2015100656A1 (en) | 2013-12-31 | 2015-07-09 | 华为技术有限公司 | Method and device for implementing virtual machine communication |
| US9992103B2 (en) | 2014-01-24 | 2018-06-05 | Cisco Technology, Inc. | Method for providing sticky load balancing |
| US9529657B2 (en) | 2014-02-07 | 2016-12-27 | Oracle International Corporation | Techniques for generating diagnostic identifiers to trace events and identifying related diagnostic information |
| US9678731B2 (en) | 2014-02-26 | 2017-06-13 | Vmware, Inc. | Methods and apparatus to generate a customized application blueprint |
| US20150249709A1 (en) | 2014-02-28 | 2015-09-03 | Vmware, Inc. | Extending cloud storage with private devices |
| US9253204B2 (en) | 2014-03-19 | 2016-02-02 | International Business Machines Corporation | Generating accurate preemptive security device policy tuning recommendations |
| US9722945B2 (en) | 2014-03-31 | 2017-08-01 | Microsoft Technology Licensing, Llc | Dynamically identifying target capacity when scaling cloud resources |
| US9591064B2 (en) | 2014-03-31 | 2017-03-07 | Verizon Patent And Licensing Inc. | Method and apparatus for dynamic provisioning of communication services |
| US9755858B2 (en) | 2014-04-15 | 2017-09-05 | Cisco Technology, Inc. | Programmable infrastructure gateway for enabling hybrid cloud services in a network environment |
| US20150309908A1 (en) | 2014-04-29 | 2015-10-29 | Hewlett-Packard Development Company, L.P. | Generating an interactive visualization of metrics collected for functional entities |
| US20150319063A1 (en) | 2014-04-30 | 2015-11-05 | Jive Communications, Inc. | Dynamically associating a datacenter with a network device |
| US9473365B2 (en) | 2014-05-08 | 2016-10-18 | Cisco Technology, Inc. | Collaborative inter-service scheduling of logical resources in cloud platforms |
| US9483378B2 (en) | 2014-05-21 | 2016-11-01 | Dynatrace Llc | Method and system for resource monitoring of large-scale, orchestrated, multi process job execution environments |
| US9582254B2 (en) | 2014-05-22 | 2017-02-28 | Oracle International Corporation | Generating runtime components |
| US9426221B2 (en) | 2014-06-18 | 2016-08-23 | International Business Machines Corporation | Dynamic proximity based networked storage |
| US10375024B2 (en) | 2014-06-20 | 2019-08-06 | Zscaler, Inc. | Cloud-based virtual private access systems and methods |
| US9613078B2 (en) | 2014-06-26 | 2017-04-04 | Amazon Technologies, Inc. | Multi-database log with multi-item transaction support |
| US10122605B2 (en) | 2014-07-09 | 2018-11-06 | Cisco Technology, Inc | Annotation of network activity through different phases of execution |
| US20160013990A1 (en) | 2014-07-09 | 2016-01-14 | Cisco Technology, Inc. | Network traffic management using heat maps with actual and planned /estimated metrics |
| CN105446793B (en) | 2014-08-28 | 2018-08-28 | 国际商业机器公司 | The method and apparatus for migrating fictitious assets |
| US9825878B2 (en) | 2014-09-26 | 2017-11-21 | Cisco Technology, Inc. | Distributed application framework for prioritizing network traffic using application priority awareness |
| US9634928B2 (en) | 2014-09-29 | 2017-04-25 | Juniper Networks, Inc. | Mesh network of simple nodes with centralized control |
| US9600337B2 (en) | 2014-09-30 | 2017-03-21 | Nimble Storage, Inc. | Congestion avoidance in network storage device using dynamic weights |
| US10834450B2 (en) | 2014-09-30 | 2020-11-10 | Nbcuniversal Media, Llc | Digital content audience matching and targeting system and method |
| US10320679B2 (en) | 2014-09-30 | 2019-06-11 | Nicira, Inc. | Inline load balancing |
| US20160099847A1 (en) | 2014-10-02 | 2016-04-07 | Cisco Technology, Inc. | Method for non-disruptive cloud infrastructure software component deployment |
| US11087263B2 (en) | 2014-10-09 | 2021-08-10 | Splunk Inc. | System monitoring with key performance indicators from shared base search of machine data |
| US10592093B2 (en) | 2014-10-09 | 2020-03-17 | Splunk Inc. | Anomaly detection |
| US10757170B2 (en) | 2014-10-13 | 2020-08-25 | Vmware, Inc. | Cross-cloud namespace management for multi-tenant environments |
| US9558078B2 (en) | 2014-10-28 | 2017-01-31 | Microsoft Technology Licensing, Llc | Point in time database restore from storage snapshots |
| CN104320342B (en) | 2014-10-29 | 2017-10-27 | 新华三技术有限公司 | Message forwarding method and device in a kind of transparent interconnection of lots of links internet |
| US9871745B2 (en) | 2014-11-12 | 2018-01-16 | International Business Machines Corporation | Automatic scaling of at least one user application to external clouds |
| KR102255216B1 (en) | 2014-11-20 | 2021-05-24 | 삼성전자주식회사 | Pci device and pci system including the same |
| US9602544B2 (en) | 2014-12-05 | 2017-03-21 | Viasat, Inc. | Methods and apparatus for providing a secure overlay network between clouds |
| US9792245B2 (en) | 2014-12-09 | 2017-10-17 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Peripheral component interconnect express (PCIe) devices with efficient memory mapping by remapping a plurality of base address registers (BARs) |
| US9075649B1 (en) | 2015-01-26 | 2015-07-07 | Storagecraft Technology Corporation | Exposing a proprietary image backup to a hypervisor as a disk file that is bootable by the hypervisor |
| US10050862B2 (en) | 2015-02-09 | 2018-08-14 | Cisco Technology, Inc. | Distributed application framework that uses network and application awareness for placing data |
| US9736063B2 (en) | 2015-02-17 | 2017-08-15 | Huawei Technologies Co., Ltd. | Service chaining using source routing |
| WO2016134182A1 (en) | 2015-02-18 | 2016-08-25 | Unravel Data Systems, Inc. | System and method for analyzing big data activities |
| US10037617B2 (en) | 2015-02-27 | 2018-07-31 | Cisco Technology, Inc. | Enhanced user interface systems including dynamic context selection for cloud-based networks |
| US10708342B2 (en) | 2015-02-27 | 2020-07-07 | Cisco Technology, Inc. | Dynamic troubleshooting workspaces for cloud and network management systems |
| US9928377B2 (en) | 2015-03-19 | 2018-03-27 | Netskope, Inc. | Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS) |
| US9432294B1 (en) | 2015-03-21 | 2016-08-30 | Cisco Technology, Inc. | Utilizing user-specified access control lists in conjunction with redirection and load-balancing on a port |
| US9954783B1 (en) | 2015-03-31 | 2018-04-24 | Cisco Technology, Inc. | System and method for minimizing disruption from failed service nodes |
| US9444744B1 (en) | 2015-04-04 | 2016-09-13 | Cisco Technology, Inc. | Line-rate selective load balancing of permitted network traffic |
| US9727359B2 (en) | 2015-04-27 | 2017-08-08 | Red Hat Israel, Ltd. | Virtual machine function based sub-page base address register access for peripheral component interconnect device assignment |
| US10554620B2 (en) | 2015-05-29 | 2020-02-04 | Cisco Technology, Inc. | Default gateway extension |
| US9542115B1 (en) | 2015-06-23 | 2017-01-10 | Netapp, Inc. | Methods and systems for trouble shooting performance issues in networked storage systems |
| US20170024260A1 (en) | 2015-07-21 | 2017-01-26 | Cisco Technology, Inc. | Workload migration across cloud providers and data centers |
| US20170026470A1 (en) | 2015-07-22 | 2017-01-26 | Cisco Technology, Inc. | Intercloud audience and content analytics |
| US9705909B2 (en) | 2015-07-29 | 2017-07-11 | Verizon Digital Media Services Inc. | Automatic detection and mitigation of security weaknesses with a self-configuring firewall |
| US9667657B2 (en) | 2015-08-04 | 2017-05-30 | AO Kaspersky Lab | System and method of utilizing a dedicated computer security service |
| US10547540B2 (en) | 2015-08-29 | 2020-01-28 | Vmware, Inc. | Routing optimization for inter-cloud connectivity |
| US10067780B2 (en) | 2015-10-06 | 2018-09-04 | Cisco Technology, Inc. | Performance-based public cloud selection for a hybrid cloud environment |
| US10462136B2 (en) | 2015-10-13 | 2019-10-29 | Cisco Technology, Inc. | Hybrid cloud security groups |
| US9804988B1 (en) | 2015-10-30 | 2017-10-31 | Amazon Technologies, Inc. | Device full memory access through standard PCI express bus |
| US20170126583A1 (en) | 2015-11-03 | 2017-05-04 | Le Holdings (Beijing) Co., Ltd. | Method and electronic device for bandwidth allocation based on online media services |
| US9912614B2 (en) | 2015-12-07 | 2018-03-06 | Brocade Communications Systems LLC | Interconnection of switches based on hierarchical overlay tunneling |
| US10142293B2 (en) | 2015-12-15 | 2018-11-27 | International Business Machines Corporation | Dynamically defined virtual private network tunnels in hybrid cloud environments |
| CN105740084B (en) | 2016-01-27 | 2018-08-24 | 北京航空航天大学 | Consider the cloud computing system Reliability Modeling of common cause fault |
| US11245593B2 (en) | 2016-04-25 | 2022-02-08 | Vmware, Inc. | Frequency-domain analysis of data-center operational and performance metrics |
| US10237187B2 (en) | 2016-04-29 | 2019-03-19 | Citrix Systems, Inc. | System and method for service chain load balancing |
| US10129177B2 (en) | 2016-05-23 | 2018-11-13 | Cisco Technology, Inc. | Inter-cloud broker for hybrid cloud networks |
| EP3291120B1 (en) | 2016-09-06 | 2021-04-21 | Accenture Global Solutions Limited | Graph database analysis for network anomaly detection systems |
| US10409367B2 (en) | 2016-12-21 | 2019-09-10 | Ca, Inc. | Predictive graph selection |
| US10346762B2 (en) | 2016-12-21 | 2019-07-09 | Ca, Inc. | Collaborative data analytics application |
-
2015
- 2015-10-06 US US14/876,627 patent/US11005682B2/en active Active
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130232491A1 (en) * | 2008-06-13 | 2013-09-05 | Netapp Inc. | Virtual machine communication |
| US20110261828A1 (en) * | 2010-04-27 | 2011-10-27 | Cisco Technology, Inc. | Virtual switching overlay for cloud computing |
| US20130232492A1 (en) * | 2010-10-19 | 2013-09-05 | Zte Corporation | Method and system for realizing virtual machine mobility |
| US20130268643A1 (en) * | 2012-04-05 | 2013-10-10 | Cisco Technology, Inc. | System and method for migrating application virtual machines in a network environment |
| US8909780B1 (en) * | 2012-05-24 | 2014-12-09 | Amazon Technologies, Inc. | Connection following during network reconfiguration |
| US20150063102A1 (en) * | 2013-08-30 | 2015-03-05 | Cisco Technology, Inc. | Flow Based Network Service Insertion |
| US20160188527A1 (en) * | 2014-12-29 | 2016-06-30 | Vmware, Inc. | Methods and systems to achieve multi-tenancy in rdma over converged ethernet |
| US20170054659A1 (en) * | 2015-08-20 | 2017-02-23 | Intel Corporation | Techniques for routing packets between virtual machines |
Cited By (184)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10212074B2 (en) | 2011-06-24 | 2019-02-19 | Cisco Technology, Inc. | Level of hierarchy in MST for traffic localization and load balancing |
| US10257042B2 (en) | 2012-01-13 | 2019-04-09 | Cisco Technology, Inc. | System and method for managing site-to-site VPNs of a cloud managed network |
| US10454984B2 (en) | 2013-03-14 | 2019-10-22 | Cisco Technology, Inc. | Method for streaming packet captures from network access devices to a cloud server over HTTP |
| US10461959B2 (en) | 2014-04-15 | 2019-10-29 | Cisco Technology, Inc. | Programmable infrastructure gateway for enabling hybrid cloud services in a network environment |
| US10972312B2 (en) | 2014-04-15 | 2021-04-06 | Cisco Technology, Inc. | Programmable infrastructure gateway for enabling hybrid cloud services in a network environment |
| US11606226B2 (en) | 2014-04-15 | 2023-03-14 | Cisco Technology, Inc. | Programmable infrastructure gateway for enabling hybrid cloud services in a network environment |
| US9935894B2 (en) | 2014-05-08 | 2018-04-03 | Cisco Technology, Inc. | Collaborative inter-service scheduling of logical resources in cloud platforms |
| US10148565B2 (en) * | 2014-06-03 | 2018-12-04 | Huawei Technologies Co., Ltd. | OPENFLOW communication method and system, controller, and service gateway |
| US20170085473A1 (en) * | 2014-06-03 | 2017-03-23 | Huawei Technologies Co., Ltd. | OPENFLOW Communication Method and System, Controller, and Service Gateway |
| US10122605B2 (en) | 2014-07-09 | 2018-11-06 | Cisco Technology, Inc | Annotation of network activity through different phases of execution |
| US10805235B2 (en) | 2014-09-26 | 2020-10-13 | Cisco Technology, Inc. | Distributed application framework for prioritizing network traffic using application priority awareness |
| US10050862B2 (en) | 2015-02-09 | 2018-08-14 | Cisco Technology, Inc. | Distributed application framework that uses network and application awareness for placing data |
| US10825212B2 (en) | 2015-02-27 | 2020-11-03 | Cisco Technology, Inc. | Enhanced user interface systems including dynamic context selection for cloud-based networks |
| US10708342B2 (en) | 2015-02-27 | 2020-07-07 | Cisco Technology, Inc. | Dynamic troubleshooting workspaces for cloud and network management systems |
| US10037617B2 (en) | 2015-02-27 | 2018-07-31 | Cisco Technology, Inc. | Enhanced user interface systems including dynamic context selection for cloud-based networks |
| US10382534B1 (en) | 2015-04-04 | 2019-08-13 | Cisco Technology, Inc. | Selective load balancing of network traffic |
| US11122114B2 (en) | 2015-04-04 | 2021-09-14 | Cisco Technology, Inc. | Selective load balancing of network traffic |
| US11843658B2 (en) | 2015-04-04 | 2023-12-12 | Cisco Technology, Inc. | Selective load balancing of network traffic |
| US10938937B2 (en) | 2015-05-15 | 2021-03-02 | Cisco Technology, Inc. | Multi-datacenter message queue |
| US10476982B2 (en) | 2015-05-15 | 2019-11-12 | Cisco Technology, Inc. | Multi-datacenter message queue |
| US10034201B2 (en) | 2015-07-09 | 2018-07-24 | Cisco Technology, Inc. | Stateless load-balancing across multiple tunnels |
| US10901769B2 (en) | 2015-10-06 | 2021-01-26 | Cisco Technology, Inc. | Performance-based public cloud selection for a hybrid cloud environment |
| US10067780B2 (en) | 2015-10-06 | 2018-09-04 | Cisco Technology, Inc. | Performance-based public cloud selection for a hybrid cloud environment |
| US12363115B2 (en) | 2015-10-13 | 2025-07-15 | Cisco Technology, Inc. | Hybrid cloud security groups |
| US10462136B2 (en) | 2015-10-13 | 2019-10-29 | Cisco Technology, Inc. | Hybrid cloud security groups |
| US11218483B2 (en) | 2015-10-13 | 2022-01-04 | Cisco Technology, Inc. | Hybrid cloud security groups |
| US10523657B2 (en) | 2015-11-16 | 2019-12-31 | Cisco Technology, Inc. | Endpoint privacy preservation with cloud conferencing |
| US10205677B2 (en) | 2015-11-24 | 2019-02-12 | Cisco Technology, Inc. | Cloud resource placement optimization and migration execution in federated clouds |
| US10084703B2 (en) | 2015-12-04 | 2018-09-25 | Cisco Technology, Inc. | Infrastructure-exclusive service forwarding |
| US20170171298A1 (en) * | 2015-12-09 | 2017-06-15 | Intel Corporation | Enhanced virtual switch for network function virtualization |
| US10367914B2 (en) | 2016-01-12 | 2019-07-30 | Cisco Technology, Inc. | Attaching service level agreements to application containers and enabling service assurance |
| US10999406B2 (en) | 2016-01-12 | 2021-05-04 | Cisco Technology, Inc. | Attaching service level agreements to application containers and enabling service assurance |
| US11093271B2 (en) | 2016-03-18 | 2021-08-17 | Airwatch Llc | Enforcing compliance rules using host management components |
| US11720393B2 (en) | 2016-03-18 | 2023-08-08 | Airwatch Llc | Enforcing compliance rules using guest management components |
| US10129177B2 (en) | 2016-05-23 | 2018-11-13 | Cisco Technology, Inc. | Inter-cloud broker for hybrid cloud networks |
| US20180007123A1 (en) * | 2016-06-30 | 2018-01-04 | Alibaba Group Holding Limited | Express route transmissions between virtual machines and cloud service computing devices |
| US10432450B2 (en) * | 2016-06-30 | 2019-10-01 | Microsoft Technology Licensing, Llc. | Data plane API in a distributed computing network |
| US10404788B2 (en) * | 2016-06-30 | 2019-09-03 | Alibaba Group Holding Limited | Express route transmissions between virtual machines and cloud service computing devices |
| US10659283B2 (en) | 2016-07-08 | 2020-05-19 | Cisco Technology, Inc. | Reducing ARP/ND flooding in cloud environment |
| US10608865B2 (en) | 2016-07-08 | 2020-03-31 | Cisco Technology, Inc. | Reducing ARP/ND flooding in cloud environment |
| US10432532B2 (en) | 2016-07-12 | 2019-10-01 | Cisco Technology, Inc. | Dynamically pinning micro-service to uplink port |
| US10382597B2 (en) | 2016-07-20 | 2019-08-13 | Cisco Technology, Inc. | System and method for transport-layer level identification and isolation of container traffic |
| US10263898B2 (en) | 2016-07-20 | 2019-04-16 | Cisco Technology, Inc. | System and method for implementing universal cloud classification (UCC) as a service (UCCaaS) |
| US10419330B2 (en) | 2016-07-21 | 2019-09-17 | Alibaba Group Holding Limited | Express route transmissions between virtual machines and cloud service computing devices |
| US10142346B2 (en) | 2016-07-28 | 2018-11-27 | Cisco Technology, Inc. | Extension of a private cloud end-point group to a public cloud |
| US10567344B2 (en) | 2016-08-23 | 2020-02-18 | Cisco Technology, Inc. | Automatic firewall configuration based on aggregated cloud managed information |
| US10812413B2 (en) | 2016-08-27 | 2020-10-20 | Nicira, Inc. | Logical network domains stretched between public and private datacenters |
| US10484302B2 (en) * | 2016-08-27 | 2019-11-19 | Nicira, Inc. | Managed forwarding element executing in public cloud data compute node with different internal and external network addresses |
| US10924431B2 (en) | 2016-08-27 | 2021-02-16 | Nicira, Inc. | Distributed processing of north-south traffic for logical network in public cloud |
| US10367757B2 (en) | 2016-08-27 | 2019-07-30 | Nicira, Inc. | Extension of network control system into public cloud |
| US11792138B2 (en) | 2016-08-27 | 2023-10-17 | Nicira, Inc. | Centralized processing of north-south traffic for logical network in public cloud |
| US11018993B2 (en) | 2016-08-27 | 2021-05-25 | Nicira, Inc. | Distributed network encryption for logical network implemented in public cloud |
| US12489681B2 (en) | 2016-08-27 | 2025-12-02 | VMware LLC | Extension of network control system into public cloud |
| US10397136B2 (en) | 2016-08-27 | 2019-08-27 | Nicira, Inc. | Managed forwarding element executing in separate namespace of public cloud data compute node than workload application |
| US11012507B2 (en) * | 2016-08-29 | 2021-05-18 | Vmware, Inc. | High throughput layer 2 extension leveraging CPU flow affinity |
| US10805330B2 (en) | 2016-08-31 | 2020-10-13 | Nicira, Inc. | Identifying and handling threats to data compute nodes in public cloud |
| US10341371B2 (en) | 2016-08-31 | 2019-07-02 | Nicira, Inc. | Identifying and handling threats to data compute nodes in public cloud |
| US11050586B2 (en) * | 2016-09-26 | 2021-06-29 | Huawei Technologies Co., Ltd. | Inter-cloud communication method and related device, and inter-cloud communication configuration method and related device |
| US12335117B2 (en) * | 2016-09-28 | 2025-06-17 | Amazon Technologies, Inc. | Visualization of network health information |
| US12432163B2 (en) | 2016-10-10 | 2025-09-30 | Cisco Technology, Inc. | Orchestration system for migrating user data and services based on user information |
| US10523592B2 (en) | 2016-10-10 | 2019-12-31 | Cisco Technology, Inc. | Orchestration system for migrating user data and services based on user information |
| US11716288B2 (en) | 2016-10-10 | 2023-08-01 | Cisco Technology, Inc. | Orchestration system for migrating user data and services based on user information |
| US11044162B2 (en) | 2016-12-06 | 2021-06-22 | Cisco Technology, Inc. | Orchestration of cloud and fog interactions |
| US10326817B2 (en) | 2016-12-20 | 2019-06-18 | Cisco Technology, Inc. | System and method for quality-aware recording in large scale collaborate clouds |
| US10334029B2 (en) | 2017-01-10 | 2019-06-25 | Cisco Technology, Inc. | Forming neighborhood groups from disperse cloud providers |
| US10552191B2 (en) | 2017-01-26 | 2020-02-04 | Cisco Technology, Inc. | Distributed hybrid cloud orchestration model |
| US10917351B2 (en) | 2017-01-30 | 2021-02-09 | Cisco Technology, Inc. | Reliable load-balancer using segment routing and real-time application monitoring |
| US10320683B2 (en) | 2017-01-30 | 2019-06-11 | Cisco Technology, Inc. | Reliable load-balancer using segment routing and real-time application monitoring |
| US10671571B2 (en) | 2017-01-31 | 2020-06-02 | Cisco Technology, Inc. | Fast network performance in containerized environments for network function virtualization |
| US10523512B2 (en) * | 2017-03-24 | 2019-12-31 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
| US20180278478A1 (en) * | 2017-03-24 | 2018-09-27 | Cisco Technology, Inc. | Network Agent For Generating Platform Specific Network Policies |
| US11252038B2 (en) | 2017-03-24 | 2022-02-15 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
| US11349802B2 (en) * | 2017-04-04 | 2022-05-31 | Samsung Electronics Co., Ltd. | Device and method for setting transmission rules of data packet in software defined network |
| US11005731B2 (en) | 2017-04-05 | 2021-05-11 | Cisco Technology, Inc. | Estimating model parameters for automatic deployment of scalable micro services |
| US10715597B2 (en) | 2017-06-16 | 2020-07-14 | At&T Intellectual Property I, L.P. | Methods and systems to create a network-agnostic SDN-based cloud gateway for connectivity to multiple cloud service providers |
| US10382274B2 (en) | 2017-06-26 | 2019-08-13 | Cisco Technology, Inc. | System and method for wide area zero-configuration network auto configuration |
| US10439877B2 (en) | 2017-06-26 | 2019-10-08 | Cisco Technology, Inc. | Systems and methods for enabling wide area multicast domain name system |
| CN107547258A (en) * | 2017-07-18 | 2018-01-05 | 新华三云计算技术有限公司 | The implementation method and device of a kind of network strategy |
| US11411799B2 (en) | 2017-07-21 | 2022-08-09 | Cisco Technology, Inc. | Scalable statistics and analytics mechanisms in cloud networking |
| US11695640B2 (en) | 2017-07-21 | 2023-07-04 | Cisco Technology, Inc. | Container telemetry in data center environments with blade servers and switches |
| US11196632B2 (en) | 2017-07-21 | 2021-12-07 | Cisco Technology, Inc. | Container telemetry in data center environments with blade servers and switches |
| US10425288B2 (en) | 2017-07-21 | 2019-09-24 | Cisco Technology, Inc. | Container telemetry in data center environments with blade servers and switches |
| US10892940B2 (en) | 2017-07-21 | 2021-01-12 | Cisco Technology, Inc. | Scalable statistics and analytics mechanisms in cloud networking |
| US10601693B2 (en) | 2017-07-24 | 2020-03-24 | Cisco Technology, Inc. | System and method for providing scalable flow monitoring in a data center fabric |
| US11233721B2 (en) | 2017-07-24 | 2022-01-25 | Cisco Technology, Inc. | System and method for providing scalable flow monitoring in a data center fabric |
| US11159412B2 (en) | 2017-07-24 | 2021-10-26 | Cisco Technology, Inc. | System and method for providing scalable flow monitoring in a data center fabric |
| US12184486B2 (en) | 2017-07-25 | 2024-12-31 | Cisco Technology, Inc. | Detecting and resolving multicast traffic performance issues |
| US10541866B2 (en) | 2017-07-25 | 2020-01-21 | Cisco Technology, Inc. | Detecting and resolving multicast traffic performance issues |
| US11102065B2 (en) | 2017-07-25 | 2021-08-24 | Cisco Technology, Inc. | Detecting and resolving multicast traffic performance issues |
| US11115465B2 (en) | 2017-08-24 | 2021-09-07 | Nicira, Inc. | Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table |
| US10567482B2 (en) | 2017-08-24 | 2020-02-18 | Nicira, Inc. | Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table |
| US10491516B2 (en) | 2017-08-24 | 2019-11-26 | Nicira, Inc. | Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table |
| US11695697B2 (en) | 2017-08-27 | 2023-07-04 | Nicira, Inc. | Performing in-line service in public cloud |
| US12470623B2 (en) * | 2017-08-31 | 2025-11-11 | Oracle International Corporation | System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment |
| US20220263892A1 (en) * | 2017-08-31 | 2022-08-18 | Oracle International Corporation | System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment |
| US10353800B2 (en) | 2017-10-18 | 2019-07-16 | Cisco Technology, Inc. | System and method for graph based monitoring and management of distributed systems |
| US10866879B2 (en) | 2017-10-18 | 2020-12-15 | Cisco Technology, Inc. | System and method for graph based monitoring and management of distributed systems |
| US12197396B2 (en) | 2017-11-13 | 2025-01-14 | Cisco Technology, Inc. | Using persistent memory to enable restartability of bulk load transactions in cloud databases |
| US11481362B2 (en) | 2017-11-13 | 2022-10-25 | Cisco Technology, Inc. | Using persistent memory to enable restartability of bulk load transactions in cloud databases |
| US10862753B2 (en) | 2017-12-04 | 2020-12-08 | Nicira, Inc. | High availability for stateful services in public cloud logical networks |
| US10601705B2 (en) | 2017-12-04 | 2020-03-24 | Nicira, Inc. | Failover of centralized routers in public cloud logical networks |
| US10705882B2 (en) | 2017-12-21 | 2020-07-07 | Cisco Technology, Inc. | System and method for resource placement across clouds for data intensive workloads |
| US11595474B2 (en) | 2017-12-28 | 2023-02-28 | Cisco Technology, Inc. | Accelerating data replication using multicast and non-volatile memory enabled nodes |
| US20190222574A1 (en) * | 2018-01-17 | 2019-07-18 | Vmware, Inc. | Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment |
| US10728243B2 (en) * | 2018-01-17 | 2020-07-28 | Vmware, Inc. | Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment |
| US10979416B2 (en) * | 2018-03-26 | 2021-04-13 | Nicira, Inc. | System and method for authentication in a public cloud |
| US20190297072A1 (en) * | 2018-03-26 | 2019-09-26 | Nicira, Inc. | System and method for authentication in a public cloud |
| US10511534B2 (en) | 2018-04-06 | 2019-12-17 | Cisco Technology, Inc. | Stateless distributed load-balancing |
| US11233737B2 (en) | 2018-04-06 | 2022-01-25 | Cisco Technology, Inc. | Stateless distributed load-balancing |
| US10887350B2 (en) * | 2018-04-09 | 2021-01-05 | Nicira, Inc. | Method and system for applying compliance policies on private and public cloud |
| US20190312909A1 (en) * | 2018-04-09 | 2019-10-10 | Nicira, Inc. | Method and system for applying compliance policies on private and public cloud |
| US11063903B2 (en) * | 2018-04-11 | 2021-07-13 | Vmware, Inc. | Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels |
| US20220070139A1 (en) * | 2018-04-11 | 2022-03-03 | Vmware, Inc. | Port and loopback ip addresses allocation scheme for full-mesh communications with transparent tls tunnels |
| US11936613B2 (en) * | 2018-04-11 | 2024-03-19 | Vmware, Inc. | Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels |
| US10728361B2 (en) | 2018-05-29 | 2020-07-28 | Cisco Technology, Inc. | System for association of customer information across subscribers |
| US11252256B2 (en) | 2018-05-29 | 2022-02-15 | Cisco Technology, Inc. | System for association of customer information across subscribers |
| US10904322B2 (en) | 2018-06-15 | 2021-01-26 | Cisco Technology, Inc. | Systems and methods for scaling down cloud-based servers handling secure connections |
| US11968198B2 (en) | 2018-06-19 | 2024-04-23 | Cisco Technology, Inc. | Distributed authentication and authorization for rapid scaling of containerized services |
| US10764266B2 (en) | 2018-06-19 | 2020-09-01 | Cisco Technology, Inc. | Distributed authentication and authorization for rapid scaling of containerized services |
| US11552937B2 (en) | 2018-06-19 | 2023-01-10 | Cisco Technology, Inc. | Distributed authentication and authorization for rapid scaling of containerized services |
| US11019083B2 (en) | 2018-06-20 | 2021-05-25 | Cisco Technology, Inc. | System for coordinating distributed website analysis |
| US11343229B2 (en) | 2018-06-28 | 2022-05-24 | Vmware, Inc. | Managed forwarding element detecting invalid packet addresses |
| US10819571B2 (en) | 2018-06-29 | 2020-10-27 | Cisco Technology, Inc. | Network traffic optimization using in-situ notification system |
| US10904342B2 (en) | 2018-07-30 | 2021-01-26 | Cisco Technology, Inc. | Container networking using communication tunnels |
| EP3836487A4 (en) * | 2018-08-07 | 2022-06-29 | Sangfor Technologies Inc. | Internet access behavior management system, device and method |
| US11082399B2 (en) * | 2018-08-10 | 2021-08-03 | Microsoft Technology Licensing, Llc | Virtual switch bypass |
| US20200053050A1 (en) * | 2018-08-10 | 2020-02-13 | Microsoft Technology Licensing, Llc | Virtual switch bypass |
| US11374794B2 (en) * | 2018-08-24 | 2022-06-28 | Vmware, Inc. | Transitive routing in public cloud |
| US12074731B2 (en) | 2018-08-24 | 2024-08-27 | VMware LLC | Transitive routing in public cloud |
| US11196591B2 (en) | 2018-08-24 | 2021-12-07 | Vmware, Inc. | Centralized overlay gateway in public cloud |
| US10491466B1 (en) | 2018-08-24 | 2019-11-26 | Vmware, Inc. | Intelligent use of peering in public cloud |
| US20200067733A1 (en) * | 2018-08-24 | 2020-02-27 | Vmware, Inc. | Transitive routing in public cloud |
| US12375449B2 (en) | 2018-09-21 | 2025-07-29 | Google Llc | Virtual private cloud network switching |
| US12010097B2 (en) * | 2018-09-21 | 2024-06-11 | Google Llc | Network architecture for cloud computing environments |
| US20220174042A1 (en) * | 2018-09-21 | 2022-06-02 | Google Llc | Network Architecture for Cloud Computing Environments |
| US12238076B2 (en) * | 2018-10-02 | 2025-02-25 | Arista Networks, Inc. | In-line encryption of network data |
| US20210092103A1 (en) * | 2018-10-02 | 2021-03-25 | Arista Networks, Inc. | In-line encryption of network data |
| US10785029B2 (en) * | 2018-10-31 | 2020-09-22 | Nutanix, Inc. | Systems and methods for pairing on-premise clusters to clouds using identity service providers |
| CN111130975A (en) * | 2018-11-01 | 2020-05-08 | 深信服科技股份有限公司 | Hybrid cloud network intercommunication system and method |
| CN111124659A (en) * | 2018-11-01 | 2020-05-08 | 深信服科技股份有限公司 | Heterogeneous cloud network intercommunication system and method |
| CN111130974A (en) * | 2018-11-01 | 2020-05-08 | 深信服科技股份有限公司 | Network intercommunication system and method based on multi-cloud environment |
| CN111225071A (en) * | 2018-11-23 | 2020-06-02 | 深信服科技股份有限公司 | Cloud platform and cross-cloud platform network intercommunication system and method |
| US10958720B2 (en) | 2018-12-18 | 2021-03-23 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud based disaster recovery |
| US11489730B2 (en) | 2018-12-18 | 2022-11-01 | Storage Engine, Inc. | Methods, apparatuses and systems for configuring a network environment for a server |
| US11178221B2 (en) | 2018-12-18 | 2021-11-16 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US10983886B2 (en) | 2018-12-18 | 2021-04-20 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US11176002B2 (en) | 2018-12-18 | 2021-11-16 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US10887382B2 (en) | 2018-12-18 | 2021-01-05 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US11252019B2 (en) | 2018-12-18 | 2022-02-15 | Storage Engine, Inc. | Methods, apparatuses and systems for cloud-based disaster recovery |
| US10963283B2 (en) * | 2018-12-27 | 2021-03-30 | Nutanix, Inc. | Configuration management for hybrid cloud |
| CN111385180A (en) * | 2018-12-28 | 2020-07-07 | 中国移动通信集团重庆有限公司 | Communication tunnel construction method, device, equipment and medium |
| US11102114B2 (en) | 2018-12-28 | 2021-08-24 | Alibaba Group Holding Limited | Method, apparatus, and computer-readable storage medium for network optimization for accessing cloud service from on-premises network |
| WO2020135221A1 (en) * | 2018-12-28 | 2020-07-02 | Alibaba Group Holding Limited | Method, apparatus, and computer-readable storage medium for network optimization for accessing cloud service from on-premises network |
| US20200252234A1 (en) * | 2019-01-31 | 2020-08-06 | Juniper Networks, Inc. | Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (wan) |
| US11336482B2 (en) * | 2019-01-31 | 2022-05-17 | Juniper Networks, Inc. | Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (WAN) |
| US11128490B2 (en) | 2019-04-26 | 2021-09-21 | Microsoft Technology Licensing, Llc | Enabling access to dedicated resources in a virtual network using top of rack switches |
| US11057350B2 (en) * | 2019-05-30 | 2021-07-06 | Cisco Technology, Inc. | Layer 2 mobility for hybrid multi-cloud deployments without host-overlay |
| CN114175583A (en) * | 2019-07-29 | 2022-03-11 | 思科技术公司 | System resource management in self-healing networks |
| US11563601B1 (en) | 2019-08-22 | 2023-01-24 | Juniper Networks, Inc. | Proactive tunnel configuration computation for on-demand SD-WAN tunnels |
| US12289182B1 (en) | 2019-08-22 | 2025-04-29 | Juniper Networks, Inc. | Proactive tunnel configuration computation for on-demand SD-WAN tunnels |
| CN110636115A (en) * | 2019-08-29 | 2019-12-31 | 平安医疗健康管理股份有限公司 | Cross-cloud service calling processing method, gateway server and requester server |
| US11652693B2 (en) * | 2019-09-04 | 2023-05-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Edge cloud anchoring |
| US20220294698A1 (en) * | 2019-09-04 | 2022-09-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Edge Cloud Anchoring |
| US12231389B2 (en) | 2019-09-06 | 2025-02-18 | Huawei Cloud Computing Technologies Co., Ltd. | Communication method, gateway, and management method and apparatus in hybrid cloud environment |
| WO2021043314A1 (en) * | 2019-09-06 | 2021-03-11 | 华为技术有限公司 | Communication method for hybrid cloud environment, gateway, and management method and apparatus |
| US11888809B2 (en) | 2019-09-06 | 2024-01-30 | Huawei Technologies Co., Ltd. | Communication method, gateway, and management method and apparatus in hybrid cloud environment |
| CN111049925A (en) * | 2019-12-20 | 2020-04-21 | 网易(杭州)网络有限公司 | Hybrid cloud network system, communication system and communication method |
| CN111404801A (en) * | 2020-03-27 | 2020-07-10 | 四川虹美智能科技有限公司 | Data processing method, device and system for cross-cloud manufacturer |
| US11310117B2 (en) | 2020-06-24 | 2022-04-19 | Red Hat, Inc. | Pairing of a probe entity with another entity in a cloud computing environment |
| US12445838B2 (en) * | 2020-06-28 | 2025-10-14 | Zte Corporation | 5G authentication method, 5G account opening method and system, and electronic device and computer-readable storage medium |
| US20230300612A1 (en) * | 2020-06-28 | 2023-09-21 | Zte Corporation | 5g authentication method, 5g account opening method and system, and electronic device and computer-readable storage medium |
| US11159419B1 (en) | 2021-01-29 | 2021-10-26 | Netskope, Inc. | Policy-driven data locality and residency |
| US12413627B2 (en) | 2021-03-23 | 2025-09-09 | Oracle International Corporation | Policy engine for governing cloud environments |
| US12034773B2 (en) | 2021-03-23 | 2024-07-09 | Oracle International Corporation | Policy engine for governing cloud environments |
| CN113595846A (en) * | 2021-07-20 | 2021-11-02 | 重庆长安汽车股份有限公司 | Method for realizing communication of GRE tunnel in cloud-to-cloud environment |
| US12363035B2 (en) | 2021-09-29 | 2025-07-15 | Juniper Networks, Inc. | Opportunistic mesh for software-defined wide area network (SD-WAN) |
| US20230117052A1 (en) * | 2021-10-19 | 2023-04-20 | Yokogawa Electric Corporation | Control system, control method, and non-transitory computer readable storage medium |
| EP4170981A1 (en) * | 2021-10-19 | 2023-04-26 | Yokogawa Electric Corporation | Control system, control method, and non-transitory computer readable storage medium |
| CN114500171A (en) * | 2021-12-29 | 2022-05-13 | 曙光云计算集团有限公司 | Network system and message transmission method |
| US11930045B1 (en) * | 2023-04-28 | 2024-03-12 | Snowflake Inc. | Secure network access from sandboxed applications |
| US12323468B2 (en) * | 2023-04-28 | 2025-06-03 | Snowflake Inc. | Secure execution of user-defined functions |
| US20240414210A1 (en) * | 2023-06-09 | 2024-12-12 | Fortinet, Inc. | Systems and methods for edge processing using selectively suspended network security |
| US20250097148A1 (en) * | 2023-09-19 | 2025-03-20 | Cisco Technology, Inc. | Service routing using ip encapsulation |
| US12348634B1 (en) * | 2023-12-27 | 2025-07-01 | University Of Sharjah | Framework for storage and verification of academic credentials on blockchain technology |
Also Published As
| Publication number | Publication date |
|---|---|
| US11005682B2 (en) | 2021-05-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11005682B2 (en) | Policy-driven switch overlay bypass in a hybrid cloud network environment | |
| US12363115B2 (en) | Hybrid cloud security groups | |
| EP3611883B1 (en) | Secure forwarding of tenant workloads in virtual networks | |
| US11625154B2 (en) | Stage upgrade of image versions on devices in a cluster | |
| US10680831B2 (en) | Single point of management for multi-cloud environment including route propagation, security, and application deployment | |
| US9397946B1 (en) | Forwarding to clusters of service nodes | |
| US10116559B2 (en) | Operations, administration and management (OAM) in overlay data center environments | |
| CN110838992B (en) | System and method for transferring packets between kernel modules in different network stacks | |
| US20180027009A1 (en) | Automated container security | |
| US20170317901A1 (en) | Integrated approach to monitor gbp health and adjust policy service level | |
| US11838376B2 (en) | Scaling service discovery in a micro-service environment | |
| US20180006969A1 (en) | Technique for gleaning mac and ip address bindings | |
| US10230543B2 (en) | Reducing data transmissions in a virtual private network | |
| US9825814B2 (en) | Dynamic attribute based application policy | |
| EP4535758A1 (en) | Dynamic site selection in global server load balancing (gslb) environment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHANG, DAVID W.;PATRA, ABHIJIT;BAGEPALLI, NAGARAJ A.;AND OTHERS;SIGNING DATES FROM 20151005 TO 20151006;REEL/FRAME:036740/0741 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |